Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2024, 07:18
Static task
static1
Behavioral task
behavioral1
Sample
8abfd403cc7f839963eaa085ba2bf55f3df5f482fb2c0896caf38bcd62120b99.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
8abfd403cc7f839963eaa085ba2bf55f3df5f482fb2c0896caf38bcd62120b99.exe
Resource
win10v2004-20240419-en
General
-
Target
8abfd403cc7f839963eaa085ba2bf55f3df5f482fb2c0896caf38bcd62120b99.exe
-
Size
5.7MB
-
MD5
54da90282e7b2fa9c1cf20fbbe3f0625
-
SHA1
732614d5489d69df97b74e5a53c136a85f91b857
-
SHA256
8abfd403cc7f839963eaa085ba2bf55f3df5f482fb2c0896caf38bcd62120b99
-
SHA512
e8ca340b6458622bd2928e112a3f2e70a2c470725f9d43914d4560cb10abb7d6cfac9b3b0f78842a43389c781f34043980aa72da14cc8e9dc52b8f93782141ff
-
SSDEEP
49152:0Pv94AEsKU8ggw1g+1CART5eBiyKS3EI3wybn20DCYIHvc8ixuZm9+fWsw6dTPBm:yKUgTH2M2m9UMpu1QfLczqssnKSh
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4924 Logo1_.exe 744 8abfd403cc7f839963eaa085ba2bf55f3df5f482fb2c0896caf38bcd62120b99.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ja\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\nl-nl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\en-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateComRegisterShell64.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\kab\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Car\RTL\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Java\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_neutral_~_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_neutral_split.scale-125_8wekyb3d8bbwe\Win10\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\ko-kr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\zh-tw\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\nb-no\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\en-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\BHO\ie_to_edge_stub.exe Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example1.Diagnostics\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nl\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsStore_11910.1002.5.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_3.6.73.0_neutral_split.scale-125_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Collections\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\root\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\ru\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\pl-pl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\hr-hr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\sv-se\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\LTR\contrast-white\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\fmui\fmui.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Logos\StoreLogo\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\ca-es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\images\themes\dark\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\tr-tr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\ru-ru\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\Pipeline.v10.0\Contracts\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\ro-ro\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk-1.8\include\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\nls\root\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\en-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\ja\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\tr-TR\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\Assets\Images\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Car\RTL\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\zh-tw\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\fr-ma\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\fr-fr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example1.Diagnostics\Diagnostics\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\de-de\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.106\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\plugin2\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 8abfd403cc7f839963eaa085ba2bf55f3df5f482fb2c0896caf38bcd62120b99.exe File created C:\Windows\Logo1_.exe 8abfd403cc7f839963eaa085ba2bf55f3df5f482fb2c0896caf38bcd62120b99.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4924 Logo1_.exe 4924 Logo1_.exe 4924 Logo1_.exe 4924 Logo1_.exe 4924 Logo1_.exe 4924 Logo1_.exe 4924 Logo1_.exe 4924 Logo1_.exe 4924 Logo1_.exe 4924 Logo1_.exe 4924 Logo1_.exe 4924 Logo1_.exe 4924 Logo1_.exe 4924 Logo1_.exe 4924 Logo1_.exe 4924 Logo1_.exe 4924 Logo1_.exe 4924 Logo1_.exe 4924 Logo1_.exe 4924 Logo1_.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1500 wrote to memory of 4564 1500 8abfd403cc7f839963eaa085ba2bf55f3df5f482fb2c0896caf38bcd62120b99.exe 83 PID 1500 wrote to memory of 4564 1500 8abfd403cc7f839963eaa085ba2bf55f3df5f482fb2c0896caf38bcd62120b99.exe 83 PID 1500 wrote to memory of 4564 1500 8abfd403cc7f839963eaa085ba2bf55f3df5f482fb2c0896caf38bcd62120b99.exe 83 PID 1500 wrote to memory of 4924 1500 8abfd403cc7f839963eaa085ba2bf55f3df5f482fb2c0896caf38bcd62120b99.exe 84 PID 1500 wrote to memory of 4924 1500 8abfd403cc7f839963eaa085ba2bf55f3df5f482fb2c0896caf38bcd62120b99.exe 84 PID 1500 wrote to memory of 4924 1500 8abfd403cc7f839963eaa085ba2bf55f3df5f482fb2c0896caf38bcd62120b99.exe 84 PID 4924 wrote to memory of 2836 4924 Logo1_.exe 86 PID 4924 wrote to memory of 2836 4924 Logo1_.exe 86 PID 4924 wrote to memory of 2836 4924 Logo1_.exe 86 PID 2836 wrote to memory of 3692 2836 net.exe 88 PID 2836 wrote to memory of 3692 2836 net.exe 88 PID 2836 wrote to memory of 3692 2836 net.exe 88 PID 4924 wrote to memory of 3412 4924 Logo1_.exe 56 PID 4924 wrote to memory of 3412 4924 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3412
-
C:\Users\Admin\AppData\Local\Temp\8abfd403cc7f839963eaa085ba2bf55f3df5f482fb2c0896caf38bcd62120b99.exe"C:\Users\Admin\AppData\Local\Temp\8abfd403cc7f839963eaa085ba2bf55f3df5f482fb2c0896caf38bcd62120b99.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a45B4.bat3⤵PID:4564
-
C:\Users\Admin\AppData\Local\Temp\8abfd403cc7f839963eaa085ba2bf55f3df5f482fb2c0896caf38bcd62120b99.exe"C:\Users\Admin\AppData\Local\Temp\8abfd403cc7f839963eaa085ba2bf55f3df5f482fb2c0896caf38bcd62120b99.exe"4⤵
- Executes dropped EXE
PID:744
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:3692
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
244KB
MD5d5b80ef8970e86b79ea266783e9c94c0
SHA1d4c48101fc1730d3d433e191dee9282f60e414ac
SHA2564a62d2d207908ae0621d60dee06b3c94aedf73f629d54944825805f0954ff712
SHA512c7c94792cea685976f33bdf9e019762d1d6ba23cbfa1755ad912378c4d364a7b3e08bdae88c4e813e7c9b7ed0c3d54e69b18dd8491627d21e9977c4d3bed863b
-
Filesize
571KB
MD5d60b13f00afc796226eb341091a3ddb4
SHA17202c024ac30fbc95bbc3887b55c9ef28b04db23
SHA25661340350ff59841f9ccd99ed64b5b673c4b686e36e8ebc4a6e8822ccfa7224e7
SHA512aaed53ec799bab2c24d8f000afd2f5ad9e03b05b2c81d9a445068e3600724c7a33ad63fa51d87f71506b2829c9532f0160aa90215797ee2442c3c48d4fa2626a
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize637KB
MD59cba1e86016b20490fff38fb45ff4963
SHA1378720d36869d50d06e9ffeef87488fbc2a8c8f7
SHA256a22e6d0f5c7d44fefc2204e0f7c7b048e1684f6cf249ba98c006bbf791c22d19
SHA5122f3737d29ea3925d10ea5c717786425f6434be732974586328f03691a35cd1539828e3301685749e5c4135b8094f15b87fb9659915de63678a25749e2f8f5765
-
Filesize
722B
MD5bb4dd8d54a258090f4d409a11df8d184
SHA1eaeb41f4ef2a350f0131365ebbb04a963406f2a9
SHA256896e314f19f1cabf4448f94dca1b495a85f5f7bbb7562288ee2bb527160f4595
SHA5120ab1a8a90e46834770f5d1cb6dead2afdbce82e91bf6a7d61946be3e7db058ad81cbb6e2ce4eeab90fc0b2ef5a9e9733bdaa7486589666c217048f8ffdae58fc
-
C:\Users\Admin\AppData\Local\Temp\8abfd403cc7f839963eaa085ba2bf55f3df5f482fb2c0896caf38bcd62120b99.exe.exe
Filesize5.7MB
MD5c596c3539f619ec76f36741933da5bed
SHA1b3243f0ee893528f0ccd71700ca9970def6670b5
SHA256bb9f95d1b280c1ec9ae27cf564bbb1b485e2d721d44b3288a9a43c07517e38de
SHA512e6e9bd571f8a74b0d2f1a88f9c90fbf10a2150cda55cd4ad6f9a37e0c4a957a175ecb8adf17822331e6cb83bac6fec5bdc2fc87fdb5bc2bfa46ad7dac4df31d2
-
Filesize
27KB
MD5151e98c05a995884a3f5fe2077409a99
SHA1e7379083dd24f1dc62d41698f86a805db837e929
SHA256e3cdf680322b8ce4451e5bac81f4403fabef6cc7c33d7ca23eb55564656e2413
SHA512108ce79cd432c17c4bba84878e95f1d0c38ab8546356d4e2f75eba182a145449969b602b183158f56b8ff08a7c4cbc0811fb21e07268fe9a47eaeb442737105b
-
Filesize
8B
MD5ec89b9cba2f5e7b9394fdd901d6c3977
SHA163b0db3abcd08b863a9a3944799b41efa264db40
SHA2562b4efa4e113d3044c8e47f59a7b75225cc7736c2fa28f9e52949b9441f3d77ca
SHA512901f7d44754e59fba0b1b90341927744f670463f4d18e2694617f74fe4e3f456e9088530bccc16e758fc67a23f91380a3655121ba911e8ff5173f3ac4cb0f1d2