Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/05/2024, 06:22
Static task
static1
Behavioral task
behavioral1
Sample
e08c728d744364dfef0025e851b50a350b5b017099f530ea1313b078c29de6b1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e08c728d744364dfef0025e851b50a350b5b017099f530ea1313b078c29de6b1.exe
Resource
win10v2004-20240226-en
General
-
Target
e08c728d744364dfef0025e851b50a350b5b017099f530ea1313b078c29de6b1.exe
-
Size
43KB
-
MD5
3928b5cd9fabb90328be435d865ffc49
-
SHA1
6d140b7a37b896e74790ba0035cf7d6a246ea630
-
SHA256
e08c728d744364dfef0025e851b50a350b5b017099f530ea1313b078c29de6b1
-
SHA512
7439aa9ffa8da6c5ea088852c76f692843e51cc38de734405ad333d0a7d4d20e81f91dd5a6ee02e770ef34a3c850a9cffe90da35c908e9c970a5cbd67e0021af
-
SSDEEP
768:/bWi616GVRu1yK9fMnJG2V9dDClcxmWQ3655Kv1X/qY1MSd:TWi83SHuJV9QaxmHqaNrFd
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2340 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2776 Logo1_.exe 2788 e08c728d744364dfef0025e851b50a350b5b017099f530ea1313b078c29de6b1.exe -
Loads dropped DLL 1 IoCs
pid Process 2340 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\WORDICON.EXE Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sq\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\dtplugin\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\AXIS\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\ja\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javacpl.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\pl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\bs\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\RedistList\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\co\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\et\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\zu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jhat.exe Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\text_renderer\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Triedit\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OIS.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\amd64\_desktop.ini Logo1_.exe File created C:\Program Files\Uninstall Information\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\tet\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Bibliography\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\SAMPLES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Mozilla Firefox\browser\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\BabyBlue\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Oasis\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\BORDERS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Document Parts\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\PROFILE\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\in_sidebar\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bg\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ms\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe e08c728d744364dfef0025e851b50a350b5b017099f530ea1313b078c29de6b1.exe File created C:\Windows\Logo1_.exe e08c728d744364dfef0025e851b50a350b5b017099f530ea1313b078c29de6b1.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2776 Logo1_.exe 2776 Logo1_.exe 2776 Logo1_.exe 2776 Logo1_.exe 2776 Logo1_.exe 2776 Logo1_.exe 2776 Logo1_.exe 2776 Logo1_.exe 2776 Logo1_.exe 2776 Logo1_.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2788 e08c728d744364dfef0025e851b50a350b5b017099f530ea1313b078c29de6b1.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2732 wrote to memory of 2340 2732 e08c728d744364dfef0025e851b50a350b5b017099f530ea1313b078c29de6b1.exe 28 PID 2732 wrote to memory of 2340 2732 e08c728d744364dfef0025e851b50a350b5b017099f530ea1313b078c29de6b1.exe 28 PID 2732 wrote to memory of 2340 2732 e08c728d744364dfef0025e851b50a350b5b017099f530ea1313b078c29de6b1.exe 28 PID 2732 wrote to memory of 2340 2732 e08c728d744364dfef0025e851b50a350b5b017099f530ea1313b078c29de6b1.exe 28 PID 2732 wrote to memory of 2776 2732 e08c728d744364dfef0025e851b50a350b5b017099f530ea1313b078c29de6b1.exe 29 PID 2732 wrote to memory of 2776 2732 e08c728d744364dfef0025e851b50a350b5b017099f530ea1313b078c29de6b1.exe 29 PID 2732 wrote to memory of 2776 2732 e08c728d744364dfef0025e851b50a350b5b017099f530ea1313b078c29de6b1.exe 29 PID 2732 wrote to memory of 2776 2732 e08c728d744364dfef0025e851b50a350b5b017099f530ea1313b078c29de6b1.exe 29 PID 2776 wrote to memory of 2568 2776 Logo1_.exe 31 PID 2776 wrote to memory of 2568 2776 Logo1_.exe 31 PID 2776 wrote to memory of 2568 2776 Logo1_.exe 31 PID 2776 wrote to memory of 2568 2776 Logo1_.exe 31 PID 2568 wrote to memory of 2544 2568 net.exe 33 PID 2568 wrote to memory of 2544 2568 net.exe 33 PID 2568 wrote to memory of 2544 2568 net.exe 33 PID 2568 wrote to memory of 2544 2568 net.exe 33 PID 2340 wrote to memory of 2788 2340 cmd.exe 34 PID 2340 wrote to memory of 2788 2340 cmd.exe 34 PID 2340 wrote to memory of 2788 2340 cmd.exe 34 PID 2340 wrote to memory of 2788 2340 cmd.exe 34 PID 2340 wrote to memory of 2788 2340 cmd.exe 34 PID 2340 wrote to memory of 2788 2340 cmd.exe 34 PID 2340 wrote to memory of 2788 2340 cmd.exe 34 PID 2776 wrote to memory of 1212 2776 Logo1_.exe 21 PID 2776 wrote to memory of 1212 2776 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\e08c728d744364dfef0025e851b50a350b5b017099f530ea1313b078c29de6b1.exe"C:\Users\Admin\AppData\Local\Temp\e08c728d744364dfef0025e851b50a350b5b017099f530ea1313b078c29de6b1.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aF7B.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\e08c728d744364dfef0025e851b50a350b5b017099f530ea1313b078c29de6b1.exe"C:\Users\Admin\AppData\Local\Temp\e08c728d744364dfef0025e851b50a350b5b017099f530ea1313b078c29de6b1.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:2788
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2544
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD512acb7ffeea0a49d4368c3e4cc20c558
SHA100dcb6b97b209f8a4212cf5a3fbefaa75c945b0d
SHA2568a42f3f4e6fc6e661cc0d832172ce6903d9d04662436e0efa319bb4890d6372c
SHA5120ac22cc144c1faa005180f997e837f622fed4eef0dd40ddb602a4f0dab6286cee41298c5bfdc094b9befc04c834c316ed77bc9538d59c2c8cf255450cfc8f414
-
Filesize
474KB
MD51a4b58982f0e7b7a7bfbc0bf7d5ff7f8
SHA1e6dc51380258221bf81f79fae15a81a26cf8a0a5
SHA256cae20f4b706ca22cfdc9d950594da390660a1f560beddafb8cae874658f2dfa8
SHA51255b710fc1a36fc78b6bc896e1a66928ed7a3e761f258d8fb61a54b5f6fb9a3adabfdb69e24cedcd97f0f2dd74f84f622487a766e078d99fcf5fd72516da37ee5
-
Filesize
721B
MD5a3ce75fe0cf79a246d8643daaff686a3
SHA11726bbb1e2b52a11fa8dbb9a2b25693a001d52c5
SHA25662fbc8d2825191b01045a6efbb3c67b0fdc2d82b6cd10d1ca534266a40f4c242
SHA512134a1803a2b6198e17dc7744d9db63e7988fde2bd34f6221c56b5b894042eba9a00346a97e6ade6404b478b7d274ba2127b7cab2088d87dbe0df5f13bf774274
-
C:\Users\Admin\AppData\Local\Temp\e08c728d744364dfef0025e851b50a350b5b017099f530ea1313b078c29de6b1.exe.exe
Filesize14KB
MD5ad782ffac62e14e2269bf1379bccbaae
SHA19539773b550e902a35764574a2be2d05bc0d8afc
SHA2561c8a77db924ebeb952052334dc95add388700c02b073b07973cd8fe0a0a360b8
SHA512a1e9d6316ffc55f4751090961733e98c93b2a391666ff50b50e9dea39783746e501d14127e7ee9343926976d7e3cd224f13736530354d8466ea995dab35c8dc2
-
Filesize
29KB
MD5bb6daaa7dbb0b3edea119115e087eb04
SHA1b6f0fcb36a4434d81d54f38b4d259108cd1f2b11
SHA256843bc830bb9a888ce515139022452d4089fadc6f767bd010b23ac77ae044d941
SHA512720e15b8406c420e53f683f794072a7ebe0e644960ce8095ddfd77c833f14e4429ef18a19f4fc09bb91c712a9a332179f955faddb9229c65e4cc31ec64978248
-
Filesize
8B
MD51b16d2dbd4281ce4e4e5729c608dcb0b
SHA1851e624080ba5598edb808d4b30fe2d74999ce18
SHA256c9e46fb51d0588ca1e48ca66731e11992770b9b74a982f9bdbb6ce5b5b75d549
SHA512cd1c4cf7c7871cb48ce735226b25f689b340037e6c992441e566161de7fca7410762d1a0c2670ee4b6546f7ee854d3219e0e2315c3e0387d9bbe3f08076b5a59