Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 14:18
Static task
static1
Behavioral task
behavioral1
Sample
b8ca31703c834baf0e7c0d3d0f16f28710ebd7101407e5003acea8539c660871.exe
Resource
win7-20240221-en
General
-
Target
b8ca31703c834baf0e7c0d3d0f16f28710ebd7101407e5003acea8539c660871.exe
-
Size
98KB
-
MD5
8e969a1f2381657f18de466ba4f9ecc0
-
SHA1
b95798444a7ad167dfa21ec01f4191c434d622a8
-
SHA256
b8ca31703c834baf0e7c0d3d0f16f28710ebd7101407e5003acea8539c660871
-
SHA512
a38bd87d16f5ba768f714b07c7c574c1774f0542151fc3d0872665894a7d4c5d16bbde2b262132d9b32a80a41a6b325e400ffa0beab339e5047c420fa851c61e
-
SSDEEP
1536:gLPQsrz8haFpmqr76/Y3WLpQQwFxV7qjh3rmKPNIwW:gLPN8QFda/2hAjZqMNId
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3040 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1628 Logo1_.exe 2604 b8ca31703c834baf0e7c0d3d0f16f28710ebd7101407e5003acea8539c660871.exe -
Loads dropped DLL 1 IoCs
pid Process 3040 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\VideoLAN\VLC\locale\vi\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\audio_filter\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Media Player\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ssvagent.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\de\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\nn\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\msinfo32.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\org.eclipse.update\_desktop.ini Logo1_.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ne\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{5CF72A45-AD68-472B-BBFF-38A947BD74EE}\chrome_installer.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\klist.exe Logo1_.exe File created C:\Program Files\Microsoft Games\FreeCell\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\meta_engine\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\unpack200.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.rcp.product_5.5.0.165303\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\ENFR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jabswitch.exe Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\Europe\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\lg\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\eu\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\images\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ko\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_chroma\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fr\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Stationery\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Chess\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ug\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\intf\modules\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javadoc.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\servertool.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TextConv\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Journal\de-DE\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe b8ca31703c834baf0e7c0d3d0f16f28710ebd7101407e5003acea8539c660871.exe File created C:\Windows\Logo1_.exe b8ca31703c834baf0e7c0d3d0f16f28710ebd7101407e5003acea8539c660871.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 1652 b8ca31703c834baf0e7c0d3d0f16f28710ebd7101407e5003acea8539c660871.exe 1652 b8ca31703c834baf0e7c0d3d0f16f28710ebd7101407e5003acea8539c660871.exe 1652 b8ca31703c834baf0e7c0d3d0f16f28710ebd7101407e5003acea8539c660871.exe 1652 b8ca31703c834baf0e7c0d3d0f16f28710ebd7101407e5003acea8539c660871.exe 1652 b8ca31703c834baf0e7c0d3d0f16f28710ebd7101407e5003acea8539c660871.exe 1652 b8ca31703c834baf0e7c0d3d0f16f28710ebd7101407e5003acea8539c660871.exe 1652 b8ca31703c834baf0e7c0d3d0f16f28710ebd7101407e5003acea8539c660871.exe 1652 b8ca31703c834baf0e7c0d3d0f16f28710ebd7101407e5003acea8539c660871.exe 1652 b8ca31703c834baf0e7c0d3d0f16f28710ebd7101407e5003acea8539c660871.exe 1652 b8ca31703c834baf0e7c0d3d0f16f28710ebd7101407e5003acea8539c660871.exe 1652 b8ca31703c834baf0e7c0d3d0f16f28710ebd7101407e5003acea8539c660871.exe 1652 b8ca31703c834baf0e7c0d3d0f16f28710ebd7101407e5003acea8539c660871.exe 1652 b8ca31703c834baf0e7c0d3d0f16f28710ebd7101407e5003acea8539c660871.exe 1628 Logo1_.exe 1628 Logo1_.exe 1628 Logo1_.exe 1628 Logo1_.exe 1628 Logo1_.exe 1628 Logo1_.exe 1628 Logo1_.exe 1628 Logo1_.exe 1628 Logo1_.exe 1628 Logo1_.exe 1628 Logo1_.exe 1628 Logo1_.exe 1628 Logo1_.exe 1628 Logo1_.exe 1628 Logo1_.exe 1628 Logo1_.exe 1628 Logo1_.exe 1628 Logo1_.exe 1628 Logo1_.exe 1628 Logo1_.exe 1628 Logo1_.exe 1628 Logo1_.exe 1628 Logo1_.exe 1628 Logo1_.exe 1628 Logo1_.exe 1628 Logo1_.exe 1628 Logo1_.exe 1628 Logo1_.exe 1628 Logo1_.exe 1628 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1652 wrote to memory of 3068 1652 b8ca31703c834baf0e7c0d3d0f16f28710ebd7101407e5003acea8539c660871.exe 28 PID 1652 wrote to memory of 3068 1652 b8ca31703c834baf0e7c0d3d0f16f28710ebd7101407e5003acea8539c660871.exe 28 PID 1652 wrote to memory of 3068 1652 b8ca31703c834baf0e7c0d3d0f16f28710ebd7101407e5003acea8539c660871.exe 28 PID 1652 wrote to memory of 3068 1652 b8ca31703c834baf0e7c0d3d0f16f28710ebd7101407e5003acea8539c660871.exe 28 PID 3068 wrote to memory of 2160 3068 net.exe 30 PID 3068 wrote to memory of 2160 3068 net.exe 30 PID 3068 wrote to memory of 2160 3068 net.exe 30 PID 3068 wrote to memory of 2160 3068 net.exe 30 PID 1652 wrote to memory of 3040 1652 b8ca31703c834baf0e7c0d3d0f16f28710ebd7101407e5003acea8539c660871.exe 31 PID 1652 wrote to memory of 3040 1652 b8ca31703c834baf0e7c0d3d0f16f28710ebd7101407e5003acea8539c660871.exe 31 PID 1652 wrote to memory of 3040 1652 b8ca31703c834baf0e7c0d3d0f16f28710ebd7101407e5003acea8539c660871.exe 31 PID 1652 wrote to memory of 3040 1652 b8ca31703c834baf0e7c0d3d0f16f28710ebd7101407e5003acea8539c660871.exe 31 PID 1652 wrote to memory of 1628 1652 b8ca31703c834baf0e7c0d3d0f16f28710ebd7101407e5003acea8539c660871.exe 33 PID 1652 wrote to memory of 1628 1652 b8ca31703c834baf0e7c0d3d0f16f28710ebd7101407e5003acea8539c660871.exe 33 PID 1652 wrote to memory of 1628 1652 b8ca31703c834baf0e7c0d3d0f16f28710ebd7101407e5003acea8539c660871.exe 33 PID 1652 wrote to memory of 1628 1652 b8ca31703c834baf0e7c0d3d0f16f28710ebd7101407e5003acea8539c660871.exe 33 PID 1628 wrote to memory of 2676 1628 Logo1_.exe 34 PID 1628 wrote to memory of 2676 1628 Logo1_.exe 34 PID 1628 wrote to memory of 2676 1628 Logo1_.exe 34 PID 1628 wrote to memory of 2676 1628 Logo1_.exe 34 PID 3040 wrote to memory of 2604 3040 cmd.exe 36 PID 3040 wrote to memory of 2604 3040 cmd.exe 36 PID 3040 wrote to memory of 2604 3040 cmd.exe 36 PID 3040 wrote to memory of 2604 3040 cmd.exe 36 PID 2676 wrote to memory of 2580 2676 net.exe 37 PID 2676 wrote to memory of 2580 2676 net.exe 37 PID 2676 wrote to memory of 2580 2676 net.exe 37 PID 2676 wrote to memory of 2580 2676 net.exe 37 PID 1628 wrote to memory of 2480 1628 Logo1_.exe 38 PID 1628 wrote to memory of 2480 1628 Logo1_.exe 38 PID 1628 wrote to memory of 2480 1628 Logo1_.exe 38 PID 1628 wrote to memory of 2480 1628 Logo1_.exe 38 PID 2480 wrote to memory of 3028 2480 net.exe 40 PID 2480 wrote to memory of 3028 2480 net.exe 40 PID 2480 wrote to memory of 3028 2480 net.exe 40 PID 2480 wrote to memory of 3028 2480 net.exe 40 PID 1628 wrote to memory of 1192 1628 Logo1_.exe 21 PID 1628 wrote to memory of 1192 1628 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\b8ca31703c834baf0e7c0d3d0f16f28710ebd7101407e5003acea8539c660871.exe"C:\Users\Admin\AppData\Local\Temp\b8ca31703c834baf0e7c0d3d0f16f28710ebd7101407e5003acea8539c660871.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2160
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a2359.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\b8ca31703c834baf0e7c0d3d0f16f28710ebd7101407e5003acea8539c660871.exe"C:\Users\Admin\AppData\Local\Temp\b8ca31703c834baf0e7c0d3d0f16f28710ebd7101407e5003acea8539c660871.exe"4⤵
- Executes dropped EXE
PID:2604
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2580
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:3028
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
265KB
MD5144a07f0eb9ee08baff92603553bb51b
SHA10cf1b6d320f8f167584209cd250c1d2e8fb31aaf
SHA256796386a95ca9b7bd73cdeeb4a5974272cb2aee380a9176213e7f90930ada8506
SHA512712139a7c7ba2f695d3a96440ea855505ad7b80b05657e1c31f1254168de57a2d688f21333751fe9fa4f3a6d439a506214894358aa0578a807ade561fa5050ae
-
Filesize
485KB
MD53ac7773258fe0684e8a28f3793a74ed3
SHA1316fba91c21ea13e4576a5eeec832fd585c31ca0
SHA2569f41dbbbdf4edcf63ba6262af0ae0d9a13874d0e008522af866f12f3e71b198f
SHA5128d2647018107b940fe80b5ab979570b9f255764195976272b8c2ee8640b0e91493d5e7fa598b4ce29bda8f87cf495c6c71fd62734d51761b04bb5127eb5b2b4a
-
Filesize
722B
MD50a1cda7b743776bb1ae6648030c79943
SHA15018da1dc023810105c41d9345f718661495ca20
SHA256a411930e91345aae0d158db5586e3b562cfd5c96e868b0e45a49955dd891194d
SHA51278497e41de40b78466efd53f66106cd75111b77a9d5c647e524fe58099ce53223e90a74b02fc739b6959529d48d8f6d2953f155c4a2ea97c97f46a1e1bdbf892
-
C:\Users\Admin\AppData\Local\Temp\b8ca31703c834baf0e7c0d3d0f16f28710ebd7101407e5003acea8539c660871.exe.exe
Filesize57KB
MD5fa71e60855b37c3c26d9ebbb52a0c3de
SHA1e608fea1cd4d5a34d7a86ca4e64d1db67f539f29
SHA2565122bb9ce0e46f847cf1920c4e2fcead16b3101f6f03d3225e92a5f80a2f1c1c
SHA5121b8cc9b37c24c9a5661e26cfb162fd1cb6419a4beb472bf100f4fbb61dfe9c353e8d3502af3d9a55d44a5f07dc0bf49412d5ca0d0d20fe466e3156ad1a88886b
-
Filesize
40KB
MD5ee15a6a567557bb41533caabe57892ef
SHA19507149eb9a8a36be2fddca32ffc2ee56b1c0712
SHA2562e77a08e9801594b1f91a8467a15f4e3078d4a9804e3a25567ac0f6a594f6eb1
SHA51241c4fcfc250209b1bf9e3d4d99030ff558a46089083ef92b23f924e7c6de8d9a2dcc8013957183bf544bdff2fa3ddfd5198511c2f19989f2736bef73a8adc9e4
-
Filesize
8B
MD5ec89b9cba2f5e7b9394fdd901d6c3977
SHA163b0db3abcd08b863a9a3944799b41efa264db40
SHA2562b4efa4e113d3044c8e47f59a7b75225cc7736c2fa28f9e52949b9441f3d77ca
SHA512901f7d44754e59fba0b1b90341927744f670463f4d18e2694617f74fe4e3f456e9088530bccc16e758fc67a23f91380a3655121ba911e8ff5173f3ac4cb0f1d2