Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 14:19
Static task
static1
Behavioral task
behavioral1
Sample
ea5263d89b8b9492c89bfd163417001f5237576e2ec7c5bead195a396a0184a5.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ea5263d89b8b9492c89bfd163417001f5237576e2ec7c5bead195a396a0184a5.exe
Resource
win10v2004-20240508-en
General
-
Target
ea5263d89b8b9492c89bfd163417001f5237576e2ec7c5bead195a396a0184a5.exe
-
Size
573KB
-
MD5
89e33c39bc576ce1475c2b77dfbd26ab
-
SHA1
141426cc4624a52ab9903dd59c964d9e2b96f591
-
SHA256
ea5263d89b8b9492c89bfd163417001f5237576e2ec7c5bead195a396a0184a5
-
SHA512
873cf261ef4ece65c1f8f2084d6a9571f736d39e0f63de64beaeb8a3f1c583308872dbad450e3ca404416f882c8b8a705bb89194eba9a2c157f7bdf97fb7e138
-
SSDEEP
6144:OuJpE7cV3iwbAFRWAbd4nf0H05yqE6Hl0ChW0+ksllAXBu0lWGWUJJQ4t0BHQQfu:G7a3iwbihym2g7XO3LWUQfh4Co
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2756 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2080 Logo1_.exe 2684 ea5263d89b8b9492c89bfd163417001f5237576e2ec7c5bead195a396a0184a5.exe -
Loads dropped DLL 1 IoCs
pid Process 2756 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\SC_Reader.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\co\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\Sounds\People\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\et\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Swirl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jarsigner.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\be\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VBA\VBA6\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\groove.net\ManagedObjects\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\te\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_output\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VC\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaws.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64_1.1.200.v20141007-2033\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\Australia\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\meta\reader\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Mail\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.help_2.0.102.v20141007-2301\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ne\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ADDINS\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\144DPI\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\9.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Outlook.en-us\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Proof.en\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pa\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveDocumentReview\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\lv\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Update\1.3.36.151\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\IEContentService.exe Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_platform_specific\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSEnv\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\SaslPrep\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\de\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Defender\ja-JP\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe ea5263d89b8b9492c89bfd163417001f5237576e2ec7c5bead195a396a0184a5.exe File created C:\Windows\Logo1_.exe ea5263d89b8b9492c89bfd163417001f5237576e2ec7c5bead195a396a0184a5.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2080 Logo1_.exe 2080 Logo1_.exe 2080 Logo1_.exe 2080 Logo1_.exe 2080 Logo1_.exe 2080 Logo1_.exe 2080 Logo1_.exe 2080 Logo1_.exe 2080 Logo1_.exe 2080 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2128 wrote to memory of 2756 2128 ea5263d89b8b9492c89bfd163417001f5237576e2ec7c5bead195a396a0184a5.exe 28 PID 2128 wrote to memory of 2756 2128 ea5263d89b8b9492c89bfd163417001f5237576e2ec7c5bead195a396a0184a5.exe 28 PID 2128 wrote to memory of 2756 2128 ea5263d89b8b9492c89bfd163417001f5237576e2ec7c5bead195a396a0184a5.exe 28 PID 2128 wrote to memory of 2756 2128 ea5263d89b8b9492c89bfd163417001f5237576e2ec7c5bead195a396a0184a5.exe 28 PID 2128 wrote to memory of 2080 2128 ea5263d89b8b9492c89bfd163417001f5237576e2ec7c5bead195a396a0184a5.exe 29 PID 2128 wrote to memory of 2080 2128 ea5263d89b8b9492c89bfd163417001f5237576e2ec7c5bead195a396a0184a5.exe 29 PID 2128 wrote to memory of 2080 2128 ea5263d89b8b9492c89bfd163417001f5237576e2ec7c5bead195a396a0184a5.exe 29 PID 2128 wrote to memory of 2080 2128 ea5263d89b8b9492c89bfd163417001f5237576e2ec7c5bead195a396a0184a5.exe 29 PID 2080 wrote to memory of 2248 2080 Logo1_.exe 30 PID 2080 wrote to memory of 2248 2080 Logo1_.exe 30 PID 2080 wrote to memory of 2248 2080 Logo1_.exe 30 PID 2080 wrote to memory of 2248 2080 Logo1_.exe 30 PID 2248 wrote to memory of 2568 2248 net.exe 33 PID 2248 wrote to memory of 2568 2248 net.exe 33 PID 2248 wrote to memory of 2568 2248 net.exe 33 PID 2248 wrote to memory of 2568 2248 net.exe 33 PID 2756 wrote to memory of 2684 2756 cmd.exe 34 PID 2756 wrote to memory of 2684 2756 cmd.exe 34 PID 2756 wrote to memory of 2684 2756 cmd.exe 34 PID 2756 wrote to memory of 2684 2756 cmd.exe 34 PID 2080 wrote to memory of 1284 2080 Logo1_.exe 21 PID 2080 wrote to memory of 1284 2080 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1284
-
C:\Users\Admin\AppData\Local\Temp\ea5263d89b8b9492c89bfd163417001f5237576e2ec7c5bead195a396a0184a5.exe"C:\Users\Admin\AppData\Local\Temp\ea5263d89b8b9492c89bfd163417001f5237576e2ec7c5bead195a396a0184a5.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a231A.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\ea5263d89b8b9492c89bfd163417001f5237576e2ec7c5bead195a396a0184a5.exe"C:\Users\Admin\AppData\Local\Temp\ea5263d89b8b9492c89bfd163417001f5237576e2ec7c5bead195a396a0184a5.exe"4⤵
- Executes dropped EXE
PID:2684
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2568
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD56dbfa871d18aa4c685e00f03cc40e191
SHA1ef9dba44feb63da5dcc1859ea9705622b2cee7bc
SHA25633d8e5692cce3bda96d8788ed5fb77cec05be84e18c511df639e13cd6062d6a8
SHA512cacf2c539ef66fa01408d568a35c9b556e2e4fc7687e0e8371d5a3906722603f2853792cf3468e4fca1432e809569dfd80b21edb54ac2c747a78e454c67e45c1
-
Filesize
474KB
MD5ba4aad1c708a17aec1e5e73cfb94e6b0
SHA1494510ded064f7ac8ce261301b64dce9c0e23dd7
SHA2565088353f6ff05c644d05f09e324a46f38a561c815f50eb7dc4a8378f49c7587e
SHA51229b0603190eafba6a03c1dce970501dfe796e642e6d9d5cb9a2e7c9312cad74e5b1126c6bf9bcabfd740a760bef2ea28289d9b9b773ea3e84dc0af726656be5f
-
Filesize
722B
MD549b2bdb771f918ae113eab5a4c5825e3
SHA1f35ed88516be4bbadac12768b507585d9512b841
SHA25603240d82ba136a3d92902d04c36bd6284ec2a5b2a23c003843add3218c508cbe
SHA512675e4dc55ff518cb9c8b68be6319ed296205aee8e4dbe0bfc9f21193602dffedc044f5ff470103b1e9ac79430f3ecc3c60250ba6ae8e77f4232dd2a8848d6d4c
-
C:\Users\Admin\AppData\Local\Temp\ea5263d89b8b9492c89bfd163417001f5237576e2ec7c5bead195a396a0184a5.exe.exe
Filesize544KB
MD59a1dd1d96481d61934dcc2d568971d06
SHA1f136ef9bf8bd2fc753292fb5b7cf173a22675fb3
SHA2568cebb25e240db3b6986fcaed6bc0b900fa09dad763a56fb71273529266c5c525
SHA5127ac1581f8a29e778ba1a1220670796c47fa5b838417f8f635e2cb1998a01515cff3ee57045dacb78a8ec70d43754b970743aba600379fe6d9481958d32d8a5aa
-
Filesize
29KB
MD5693e6f028a3f9f068a0b5e7250537d55
SHA12c79b8c2a6f4ebac7bf248a36d561fdc2b3532ff
SHA256862b4192b217938a0a759e4ff19510ba65521b62927794e45a13b666ac90be72
SHA5123645bc60a4185bc11f698608b757bd8d1181c7bba3b0ff801df0c40b9c721acab28352c947a4f93647fec238616af0b43f1f1d7a066617ddbe1c1eed858d5d4a
-
Filesize
8B
MD5d970a2bfcaa076939c06270d1a48dec8
SHA17a558f4d64c3e98bcfd2af83f28e6fbd207a39e1
SHA256bdc6872f9a0a011a670907f0fedad9b88e283c5af545cf9f6bd73c3709967d44
SHA512ea4c16930628455852ce343f8ae248b6df869b8da10b10928ebb802129f73d9761971811de317c7d3121b815340027782ec15d385d1d2d7df8fd0a46b62974c2