Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
02/05/2024, 08:15
Static task
static1
Behavioral task
behavioral1
Sample
cdf7c214e46de8b6259cb6a91957f8caaacdff0613aa30f8b8d14012693b4488.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
cdf7c214e46de8b6259cb6a91957f8caaacdff0613aa30f8b8d14012693b4488.exe
Resource
win10v2004-20240226-en
General
-
Target
cdf7c214e46de8b6259cb6a91957f8caaacdff0613aa30f8b8d14012693b4488.exe
-
Size
1.2MB
-
MD5
c3e574773d5ebbbdb8f4fd661384e435
-
SHA1
ebf4ca50f1f852079d717db33713042744b8fe76
-
SHA256
cdf7c214e46de8b6259cb6a91957f8caaacdff0613aa30f8b8d14012693b4488
-
SHA512
7fae8f480adb0feb6e2c31475e047953cfb8e134649773ff9d25998cbf2a413a5f11b4c8e008cdf2b728c470646395e26b1a81b32a1ae2a9015d9ce728b8d4ac
-
SSDEEP
24576:U71sQYmz7Gn/jWoHuUDCbmMqWfGL7SiwpCHr0H:U7Lzq/jWoOCUmMqWBvAq
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4708 Logo1_.exe 4124 cdf7c214e46de8b6259cb6a91957f8caaacdff0613aa30f8b8d14012693b4488.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\YourPhone.exe Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\hu-hu\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\root\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\defaults\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mn\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ne\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\vi\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\ko-kr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\Dictionaries\en_CA\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\ink\TabTip32.exe Logo1_.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\VSTO\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\en-gb\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\sv-se\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\versions\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pt_PT\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\spu\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\RTL\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example2.Diagnostics\1.0.1\Diagnostics\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.185.17\MicrosoftEdgeUpdate.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.52\msedge.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Work\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\hu-hu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\zh-tw\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\zh-tw\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\meta_engine\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\es-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\fr-ma\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\ja-jp\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\sk-sk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\tr-tr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\de-de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\ca-es\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\win8-scrollbar\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\fr-ma\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\sv-se\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\he-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.52\EBWebView\x86\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\te-IN\View3d\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\32BitMAPIBroker.exe Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\en-GB\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\sl-sl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\fr-ma\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Diagnostics\Comprehensive\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_x64__8wekyb3d8bbwe\loc_archives\en-gb\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\fr-ma\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\ca-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\themes\dark\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\ar-ae\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\tl\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\RTL\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\lv-LV\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Logos\Wide310x150\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\TextConv\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hi\LC_MESSAGES\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe cdf7c214e46de8b6259cb6a91957f8caaacdff0613aa30f8b8d14012693b4488.exe File created C:\Windows\Logo1_.exe cdf7c214e46de8b6259cb6a91957f8caaacdff0613aa30f8b8d14012693b4488.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4708 Logo1_.exe 4708 Logo1_.exe 4708 Logo1_.exe 4708 Logo1_.exe 4708 Logo1_.exe 4708 Logo1_.exe 4708 Logo1_.exe 4708 Logo1_.exe 4708 Logo1_.exe 4708 Logo1_.exe 4708 Logo1_.exe 4708 Logo1_.exe 4708 Logo1_.exe 4708 Logo1_.exe 4708 Logo1_.exe 4708 Logo1_.exe 4708 Logo1_.exe 4708 Logo1_.exe 4708 Logo1_.exe 4708 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1596 wrote to memory of 4984 1596 cdf7c214e46de8b6259cb6a91957f8caaacdff0613aa30f8b8d14012693b4488.exe 92 PID 1596 wrote to memory of 4984 1596 cdf7c214e46de8b6259cb6a91957f8caaacdff0613aa30f8b8d14012693b4488.exe 92 PID 1596 wrote to memory of 4984 1596 cdf7c214e46de8b6259cb6a91957f8caaacdff0613aa30f8b8d14012693b4488.exe 92 PID 1596 wrote to memory of 4708 1596 cdf7c214e46de8b6259cb6a91957f8caaacdff0613aa30f8b8d14012693b4488.exe 94 PID 1596 wrote to memory of 4708 1596 cdf7c214e46de8b6259cb6a91957f8caaacdff0613aa30f8b8d14012693b4488.exe 94 PID 1596 wrote to memory of 4708 1596 cdf7c214e46de8b6259cb6a91957f8caaacdff0613aa30f8b8d14012693b4488.exe 94 PID 4708 wrote to memory of 3556 4708 Logo1_.exe 95 PID 4708 wrote to memory of 3556 4708 Logo1_.exe 95 PID 4708 wrote to memory of 3556 4708 Logo1_.exe 95 PID 4984 wrote to memory of 4124 4984 cmd.exe 97 PID 4984 wrote to memory of 4124 4984 cmd.exe 97 PID 4984 wrote to memory of 4124 4984 cmd.exe 97 PID 3556 wrote to memory of 1140 3556 net.exe 98 PID 3556 wrote to memory of 1140 3556 net.exe 98 PID 3556 wrote to memory of 1140 3556 net.exe 98 PID 4708 wrote to memory of 3164 4708 Logo1_.exe 56 PID 4708 wrote to memory of 3164 4708 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3164
-
C:\Users\Admin\AppData\Local\Temp\cdf7c214e46de8b6259cb6a91957f8caaacdff0613aa30f8b8d14012693b4488.exe"C:\Users\Admin\AppData\Local\Temp\cdf7c214e46de8b6259cb6a91957f8caaacdff0613aa30f8b8d14012693b4488.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$aBD2.bat3⤵
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Users\Admin\AppData\Local\Temp\cdf7c214e46de8b6259cb6a91957f8caaacdff0613aa30f8b8d14012693b4488.exe"C:\Users\Admin\AppData\Local\Temp\cdf7c214e46de8b6259cb6a91957f8caaacdff0613aa30f8b8d14012693b4488.exe"4⤵
- Executes dropped EXE
PID:4124
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:1140
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1340 --field-trial-handle=2236,i,5367110156796017614,12594004256180761011,262144 --variations-seed-version /prefetch:81⤵PID:4032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD569e0ff51b5c71d80e8789788f4c0def5
SHA16a167207c2bcfc3af9a3db078cab336c23bff679
SHA2560c795a07deb16a871947caa3fee6505f7645fb2df3b3f33b532b4dc9d4cbe077
SHA5120c9ae6ef006ce63ab0d3d853ffbb8e5bb33bad1367863e07a0a92750d2282dda5f80590883964751260e727bc94f56198e0a24ceb81e689307dda15741d334fa
-
Filesize
570KB
MD5cdf329dfb35eba6f9f8334708e4862a5
SHA1b737a5ac4e62da9174760c8b8adf782dab5f9cdd
SHA256e5fd326ef628b19f87a5bf51f8bd04aa3583167e022b99e781b07d498077bc1f
SHA512083b3846dfb03bd6a8623c1f5001a184f4987fb66ac2b94bbc51b78f0ceb08146deb1abaabac6f852a92e5f1698f7cb526f5f74b1435fa8e2b90a0a4964d54f4
-
Filesize
721B
MD549f2cd8bc794ac03432a2426a4609b75
SHA1757e2197d8a27cbd4fba305ba5a19860eb34b501
SHA256021e0ce8fbf255cce275c015cccb81a3a20617d1f7adf9663ed0a14fa2335e30
SHA512859baf69e8f924a833fd6aced9be1a2f3507e1cc860d8bc64350788f0edd9b1f3c917934b56083ff4d8b338dce39721e120aa168b0d8c2597780f23431047dab
-
C:\Users\Admin\AppData\Local\Temp\cdf7c214e46de8b6259cb6a91957f8caaacdff0613aa30f8b8d14012693b4488.exe.exe
Filesize1.2MB
MD54d0756eb75a5ea3416008e02ba104333
SHA145219ad56e5361a05fa73d29b75c668a3f00267b
SHA2567cbffb7789087cfcd8dfc2c600cd10e758d5dd3b66e5f38b01f422a358c2a97c
SHA512ac913eceb6e6f66d3827309ce89874365cf98e01f4bb56a83145c16867c388a8a9462bfd972302ee55af446fdb67955a5dba2bfbee1785f15cf2d5f3c6a7c56f
-
Filesize
26KB
MD5eae720ddb96259ba9cc84160c4e6db6b
SHA16e6aa6b84edda1752d2720be3269e5df9a7dbc91
SHA2561e3b3150146e34c2742aa0816cab9a3720ecb9f8e6ad85db6db8624ca6a57760
SHA512a386e5ebbe057131bfcbafcd14f2efe8cb486238394819e681feb1dc7fb5695df660cb2e6dc1ce3a944b1eabc365d91994ed1f137bde0a41d8a4c882428e7610
-
Filesize
8B
MD54b4dbd7e2fe4189c8136069a10e1698a
SHA1e4e6e1e80d1fe41d20456173c522d8e7affc4579
SHA256f00f66ba8f3341c7ae8e3c7741a1ff31e522c75580afa9793dcaee17488ccf5b
SHA5122be5b324ef5d951c5e66d692c26f813e0fdd76cb4ef01a9abf38e5f7837f649e0194f7f5c55b1cfd79a9d253031ace5b270fc50f6c11f1885e85f9a874380d8c