Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/05/2024, 14:14
Static task
static1
Behavioral task
behavioral1
Sample
39de4483e57a19f1bea4653eb9f31d8cf6b5450adf9dfa262cd00edee4fe38b5.exe
Resource
win7-20240221-en
General
-
Target
39de4483e57a19f1bea4653eb9f31d8cf6b5450adf9dfa262cd00edee4fe38b5.exe
-
Size
491KB
-
MD5
c8b160531aa8d9f736d9ff319ceb61ce
-
SHA1
754418ea63855b579c9aa67587aa87279ea3907e
-
SHA256
39de4483e57a19f1bea4653eb9f31d8cf6b5450adf9dfa262cd00edee4fe38b5
-
SHA512
ef9c345b35f6f91d1271a1382f3ba61b826d27e9d60cd1b1a2f1c97dda6a2afd1bde76ed71bb9cc8d5eeeb3947ada823f1c2a331cbb28f05d9271b3024e50e31
-
SSDEEP
12288:t1quIf1gL5pRTcAkS/3hzN8qE43fm78V:t1q45jcAkSYqyE
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2984 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2472 Logo1_.exe 2524 39de4483e57a19f1bea4653eb9f31d8cf6b5450adf9dfa262cd00edee4fe38b5.exe -
Loads dropped DLL 1 IoCs
pid Process 2984 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\bin\dtplugin\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sk\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jabswitch.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\html\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\RedistList\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\mai\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\1.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk16\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\OSPPREARM.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\More Games\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\SpeechEngines\Microsoft\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\.data\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\pack200.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\amd64\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ckb\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\win\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\NETWORK\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Synchronization Services\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\reader_sl.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\ja\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javafxpackager.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Journal\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\JOURNAL\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\PIXEL\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Defender\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SLATE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\policytool.exe Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ne\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\1042\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\TableTextService\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\meta\art\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Dll.dll Logo1_.exe File created C:\Windows\rundl132.exe 39de4483e57a19f1bea4653eb9f31d8cf6b5450adf9dfa262cd00edee4fe38b5.exe File created C:\Windows\Logo1_.exe 39de4483e57a19f1bea4653eb9f31d8cf6b5450adf9dfa262cd00edee4fe38b5.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 2956 39de4483e57a19f1bea4653eb9f31d8cf6b5450adf9dfa262cd00edee4fe38b5.exe 2956 39de4483e57a19f1bea4653eb9f31d8cf6b5450adf9dfa262cd00edee4fe38b5.exe 2956 39de4483e57a19f1bea4653eb9f31d8cf6b5450adf9dfa262cd00edee4fe38b5.exe 2956 39de4483e57a19f1bea4653eb9f31d8cf6b5450adf9dfa262cd00edee4fe38b5.exe 2956 39de4483e57a19f1bea4653eb9f31d8cf6b5450adf9dfa262cd00edee4fe38b5.exe 2956 39de4483e57a19f1bea4653eb9f31d8cf6b5450adf9dfa262cd00edee4fe38b5.exe 2956 39de4483e57a19f1bea4653eb9f31d8cf6b5450adf9dfa262cd00edee4fe38b5.exe 2956 39de4483e57a19f1bea4653eb9f31d8cf6b5450adf9dfa262cd00edee4fe38b5.exe 2956 39de4483e57a19f1bea4653eb9f31d8cf6b5450adf9dfa262cd00edee4fe38b5.exe 2956 39de4483e57a19f1bea4653eb9f31d8cf6b5450adf9dfa262cd00edee4fe38b5.exe 2956 39de4483e57a19f1bea4653eb9f31d8cf6b5450adf9dfa262cd00edee4fe38b5.exe 2956 39de4483e57a19f1bea4653eb9f31d8cf6b5450adf9dfa262cd00edee4fe38b5.exe 2956 39de4483e57a19f1bea4653eb9f31d8cf6b5450adf9dfa262cd00edee4fe38b5.exe 2472 Logo1_.exe 2472 Logo1_.exe 2472 Logo1_.exe 2472 Logo1_.exe 2472 Logo1_.exe 2472 Logo1_.exe 2472 Logo1_.exe 2472 Logo1_.exe 2472 Logo1_.exe 2472 Logo1_.exe 2472 Logo1_.exe 2472 Logo1_.exe 2472 Logo1_.exe 2472 Logo1_.exe 2472 Logo1_.exe 2472 Logo1_.exe 2472 Logo1_.exe 2472 Logo1_.exe 2472 Logo1_.exe 2472 Logo1_.exe 2472 Logo1_.exe 2472 Logo1_.exe 2472 Logo1_.exe 2472 Logo1_.exe 2472 Logo1_.exe 2472 Logo1_.exe 2472 Logo1_.exe 2472 Logo1_.exe 2472 Logo1_.exe 2472 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2956 wrote to memory of 2832 2956 39de4483e57a19f1bea4653eb9f31d8cf6b5450adf9dfa262cd00edee4fe38b5.exe 28 PID 2956 wrote to memory of 2832 2956 39de4483e57a19f1bea4653eb9f31d8cf6b5450adf9dfa262cd00edee4fe38b5.exe 28 PID 2956 wrote to memory of 2832 2956 39de4483e57a19f1bea4653eb9f31d8cf6b5450adf9dfa262cd00edee4fe38b5.exe 28 PID 2956 wrote to memory of 2832 2956 39de4483e57a19f1bea4653eb9f31d8cf6b5450adf9dfa262cd00edee4fe38b5.exe 28 PID 2832 wrote to memory of 2908 2832 net.exe 30 PID 2832 wrote to memory of 2908 2832 net.exe 30 PID 2832 wrote to memory of 2908 2832 net.exe 30 PID 2832 wrote to memory of 2908 2832 net.exe 30 PID 2956 wrote to memory of 2984 2956 39de4483e57a19f1bea4653eb9f31d8cf6b5450adf9dfa262cd00edee4fe38b5.exe 31 PID 2956 wrote to memory of 2984 2956 39de4483e57a19f1bea4653eb9f31d8cf6b5450adf9dfa262cd00edee4fe38b5.exe 31 PID 2956 wrote to memory of 2984 2956 39de4483e57a19f1bea4653eb9f31d8cf6b5450adf9dfa262cd00edee4fe38b5.exe 31 PID 2956 wrote to memory of 2984 2956 39de4483e57a19f1bea4653eb9f31d8cf6b5450adf9dfa262cd00edee4fe38b5.exe 31 PID 2956 wrote to memory of 2472 2956 39de4483e57a19f1bea4653eb9f31d8cf6b5450adf9dfa262cd00edee4fe38b5.exe 33 PID 2956 wrote to memory of 2472 2956 39de4483e57a19f1bea4653eb9f31d8cf6b5450adf9dfa262cd00edee4fe38b5.exe 33 PID 2956 wrote to memory of 2472 2956 39de4483e57a19f1bea4653eb9f31d8cf6b5450adf9dfa262cd00edee4fe38b5.exe 33 PID 2956 wrote to memory of 2472 2956 39de4483e57a19f1bea4653eb9f31d8cf6b5450adf9dfa262cd00edee4fe38b5.exe 33 PID 2472 wrote to memory of 2488 2472 Logo1_.exe 34 PID 2472 wrote to memory of 2488 2472 Logo1_.exe 34 PID 2472 wrote to memory of 2488 2472 Logo1_.exe 34 PID 2472 wrote to memory of 2488 2472 Logo1_.exe 34 PID 2488 wrote to memory of 2608 2488 net.exe 36 PID 2488 wrote to memory of 2608 2488 net.exe 36 PID 2488 wrote to memory of 2608 2488 net.exe 36 PID 2488 wrote to memory of 2608 2488 net.exe 36 PID 2984 wrote to memory of 2524 2984 cmd.exe 37 PID 2984 wrote to memory of 2524 2984 cmd.exe 37 PID 2984 wrote to memory of 2524 2984 cmd.exe 37 PID 2984 wrote to memory of 2524 2984 cmd.exe 37 PID 2472 wrote to memory of 2448 2472 Logo1_.exe 38 PID 2472 wrote to memory of 2448 2472 Logo1_.exe 38 PID 2472 wrote to memory of 2448 2472 Logo1_.exe 38 PID 2472 wrote to memory of 2448 2472 Logo1_.exe 38 PID 2448 wrote to memory of 2384 2448 net.exe 40 PID 2448 wrote to memory of 2384 2448 net.exe 40 PID 2448 wrote to memory of 2384 2448 net.exe 40 PID 2448 wrote to memory of 2384 2448 net.exe 40 PID 2472 wrote to memory of 1324 2472 Logo1_.exe 21 PID 2472 wrote to memory of 1324 2472 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1324
-
C:\Users\Admin\AppData\Local\Temp\39de4483e57a19f1bea4653eb9f31d8cf6b5450adf9dfa262cd00edee4fe38b5.exe"C:\Users\Admin\AppData\Local\Temp\39de4483e57a19f1bea4653eb9f31d8cf6b5450adf9dfa262cd00edee4fe38b5.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2908
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a9DD5.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\39de4483e57a19f1bea4653eb9f31d8cf6b5450adf9dfa262cd00edee4fe38b5.exe"C:\Users\Admin\AppData\Local\Temp\39de4483e57a19f1bea4653eb9f31d8cf6b5450adf9dfa262cd00edee4fe38b5.exe"4⤵
- Executes dropped EXE
PID:2524
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2608
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2384
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258KB
MD56569ba6a19dcf267363ead3e7d709a6e
SHA12e3a72272fb2b4a849f2fc443fe6bb0f17b03f9c
SHA256da43031a617d4143466e60d648f6da2625e2f203ef46b255bfdc77ea4ed695ec
SHA51283f15ab1ba1c44af699b980c830b775289e9b382e3142fd1392206372d20be555d7c40b7a3f8e5fda9d4d7fe508a7fe45cffe5b3929d7e31d9f3af7ce39942eb
-
Filesize
478KB
MD5cc0ad68e66fa1c78c1e3b0ed71a55263
SHA138ce29b51fde2a8fd1d3c663c5c98d8b18b38007
SHA256536f02a2008e2e11502a3a3b573b641e5b377acd0f72ab2099a89adacec2fc1d
SHA51259cfd05a61703d30dd0d454ba89c4f3453943d1d9664e7f8d13886561238863d7ff6fa33a7966518420b085a72a59c407add0f29265f8fd5fefb22f0eb159b91
-
Filesize
722B
MD50f9b7cd29b460e496d6f1f15c02217fc
SHA1a89851a5cafb7dfd86cef954c7ee01c0a29a3a76
SHA2560e7bf632169527549195394626ae9b23952a015213efc6566896b7a62002a3e3
SHA512f586861948629b71a868bc249c9ce20bd53f571a6bb3bc435152250dec548b9e1dbba17bf4148db43d0078793c80785581ec53bc5965dbb6f5e874e8e92e9311
-
C:\Users\Admin\AppData\Local\Temp\39de4483e57a19f1bea4653eb9f31d8cf6b5450adf9dfa262cd00edee4fe38b5.exe.exe
Filesize458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
Filesize
33KB
MD5e66ec81a55072abc67e5c48adc2f771c
SHA1b7b45b11de92fafe2ccd0c5a0a1a1d24991eba5a
SHA2566a9fa6177b7f71bfa63a0274a9832d18bfecbdc663bf23e1580203a5456b8a90
SHA512097f9f98618b195a7af7814e7eddba5ce1c25bd3a0d7818e79b4dfda1d6d20b08b0f28dec64278015a62fd5a3bf7495ae2d65ccfa1c48fc7a30a6eb3d9cd8287
-
Filesize
8B
MD51b16d2dbd4281ce4e4e5729c608dcb0b
SHA1851e624080ba5598edb808d4b30fe2d74999ce18
SHA256c9e46fb51d0588ca1e48ca66731e11992770b9b74a982f9bdbb6ce5b5b75d549
SHA512cd1c4cf7c7871cb48ce735226b25f689b340037e6c992441e566161de7fca7410762d1a0c2670ee4b6546f7ee854d3219e0e2315c3e0387d9bbe3f08076b5a59