Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 12:18
Static task
static1
Behavioral task
behavioral1
Sample
547cd2b9601840e97d1e8cf92bba29c7f1e05d2c6f1e13aea355fc889af4137b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
547cd2b9601840e97d1e8cf92bba29c7f1e05d2c6f1e13aea355fc889af4137b.exe
Resource
win10v2004-20240426-en
General
-
Target
547cd2b9601840e97d1e8cf92bba29c7f1e05d2c6f1e13aea355fc889af4137b.exe
-
Size
1.2MB
-
MD5
f6f46ba550bec2ae79bdbfbe15abc332
-
SHA1
28c84ed9deb3a90dc5ec75c58aab33371cfd7c22
-
SHA256
547cd2b9601840e97d1e8cf92bba29c7f1e05d2c6f1e13aea355fc889af4137b
-
SHA512
265ceb854a1591479062cbd178efa7bc857bdb6201d6415608cba5f14f6639caf3e1cce226bbf8de8c8f099c080ce19c54c540f29f7403665a87b1be3ca121bb
-
SSDEEP
24576:upm0H9nQ79hBfO31W/5uuSR3WD2CA1ETobIqbtTA+5i:qQsYhuuSR3WDE1Ec5T5I
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2992 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 3008 Logo1_.exe 2564 547cd2b9601840e97d1e8cf92bba29c7f1e05d2c6f1e13aea355fc889af4137b.exe -
Loads dropped DLL 1 IoCs
pid Process 2992 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\INDUST\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jvisualvm.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\lib\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\1041\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\bg\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\gd\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pt_PT\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TextConv\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\AppInfoDocument\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java-rmi.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\gu\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe AIR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Effects\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\update_tracking\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Chess\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Shared Gadgets\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\helper.exe Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\_desktop.ini Logo1_.exe File created C:\Program Files\Mozilla Firefox\defaults\pref\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files\7-Zip\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Temp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\cache\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nb\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\120DPI\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\images\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\lg\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaw.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\tr\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\ENES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveDocumentReview\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Mahjong\de-DE\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 547cd2b9601840e97d1e8cf92bba29c7f1e05d2c6f1e13aea355fc889af4137b.exe File created C:\Windows\Logo1_.exe 547cd2b9601840e97d1e8cf92bba29c7f1e05d2c6f1e13aea355fc889af4137b.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3008 Logo1_.exe 3008 Logo1_.exe 3008 Logo1_.exe 3008 Logo1_.exe 3008 Logo1_.exe 3008 Logo1_.exe 3008 Logo1_.exe 3008 Logo1_.exe 3008 Logo1_.exe 3008 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2956 wrote to memory of 2992 2956 547cd2b9601840e97d1e8cf92bba29c7f1e05d2c6f1e13aea355fc889af4137b.exe 28 PID 2956 wrote to memory of 2992 2956 547cd2b9601840e97d1e8cf92bba29c7f1e05d2c6f1e13aea355fc889af4137b.exe 28 PID 2956 wrote to memory of 2992 2956 547cd2b9601840e97d1e8cf92bba29c7f1e05d2c6f1e13aea355fc889af4137b.exe 28 PID 2956 wrote to memory of 2992 2956 547cd2b9601840e97d1e8cf92bba29c7f1e05d2c6f1e13aea355fc889af4137b.exe 28 PID 2956 wrote to memory of 3008 2956 547cd2b9601840e97d1e8cf92bba29c7f1e05d2c6f1e13aea355fc889af4137b.exe 29 PID 2956 wrote to memory of 3008 2956 547cd2b9601840e97d1e8cf92bba29c7f1e05d2c6f1e13aea355fc889af4137b.exe 29 PID 2956 wrote to memory of 3008 2956 547cd2b9601840e97d1e8cf92bba29c7f1e05d2c6f1e13aea355fc889af4137b.exe 29 PID 2956 wrote to memory of 3008 2956 547cd2b9601840e97d1e8cf92bba29c7f1e05d2c6f1e13aea355fc889af4137b.exe 29 PID 2992 wrote to memory of 2564 2992 cmd.exe 31 PID 2992 wrote to memory of 2564 2992 cmd.exe 31 PID 2992 wrote to memory of 2564 2992 cmd.exe 31 PID 2992 wrote to memory of 2564 2992 cmd.exe 31 PID 3008 wrote to memory of 2580 3008 Logo1_.exe 32 PID 3008 wrote to memory of 2580 3008 Logo1_.exe 32 PID 3008 wrote to memory of 2580 3008 Logo1_.exe 32 PID 3008 wrote to memory of 2580 3008 Logo1_.exe 32 PID 2580 wrote to memory of 2104 2580 net.exe 34 PID 2580 wrote to memory of 2104 2580 net.exe 34 PID 2580 wrote to memory of 2104 2580 net.exe 34 PID 2580 wrote to memory of 2104 2580 net.exe 34 PID 3008 wrote to memory of 1324 3008 Logo1_.exe 21 PID 3008 wrote to memory of 1324 3008 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1324
-
C:\Users\Admin\AppData\Local\Temp\547cd2b9601840e97d1e8cf92bba29c7f1e05d2c6f1e13aea355fc889af4137b.exe"C:\Users\Admin\AppData\Local\Temp\547cd2b9601840e97d1e8cf92bba29c7f1e05d2c6f1e13aea355fc889af4137b.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a9D49.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\547cd2b9601840e97d1e8cf92bba29c7f1e05d2c6f1e13aea355fc889af4137b.exe"C:\Users\Admin\AppData\Local\Temp\547cd2b9601840e97d1e8cf92bba29c7f1e05d2c6f1e13aea355fc889af4137b.exe"4⤵
- Executes dropped EXE
PID:2564
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2104
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
252KB
MD5ee177f5357587da410f12e4e626dece9
SHA1ac89e4feee579025fdcb287108ced259b22ead22
SHA2564745e0688e594cac13b5785a7f206fc22c310797772c565693f25dfbb7f7f548
SHA512afd7b8d29540ce3ed7cd5662b2807e1ff12cf94f9fbfc8e268cdf092ff1a0bf94ba37c95f28baaa7281ae029453e48073c1fda8297624353a6da1a68d562c2fb
-
Filesize
472KB
MD588eb1bca8c399bc3f46e99cdde2f047e
SHA155fafbceb011e1af2edced978686a90971bd95f2
SHA25642fd78c05bc240d4ded16ac974f17c336f6ae3a1814d548021c48a942cc30428
SHA512149d4de0c024e25a13a7bb17471e6f48391d4f26b1c8388672320eed1c255f84219ad7b72bbebc531ae558d5192dd4bb6d0dddd6c65a45300c8e8348a4fb3728
-
Filesize
722B
MD56e573f43781f6b86b31ce5c8e659abb6
SHA15d214c04419e397b0e344756481b83128da148ce
SHA256a7466ad7360bbc2c5c435c8bf319cce68081fe8e22a15b84a4ccd501460259ba
SHA51204c3fd0f7dc90014814ff6a71731942dfe2d13ccd8c4ee77c001e83d38ad986008e17e29573b6f14573dc48f70e8426913b2c36e3442fa0e8c6a5518303ea66a
-
C:\Users\Admin\AppData\Local\Temp\547cd2b9601840e97d1e8cf92bba29c7f1e05d2c6f1e13aea355fc889af4137b.exe.exe
Filesize1.2MB
MD5f855372e102937242692dd95d862a0a7
SHA1ce3a8398485ea1467ab5bc389f09b9120ad8e5e4
SHA256e3ed541c35fed452270fce3bc9868c7adf3dba6e51b83cdf546766af832863ab
SHA5127e3f16b92e490a6276e27d02b1c420a1a8198cc11bf73848dc0644095c85862b9ff8bf63b95c0657cbfc713fbe53ceb5e12767466c205724e659f6694c8f771e
-
Filesize
27KB
MD5591d5f504128496faf3fa7cade4a47c7
SHA1c07d118849c76ace4dcc3ce2e0f6941a4c1bc899
SHA25665842e84b61d8caaab9568bea23ed448d7374e72b0c9f09dc36191e3328a456c
SHA5127d0a7f38895098b7e31f9bb3be6668871a9c5ef2a912359a20f145c8e905c0751bfd5e50f5ba203b5b463981c9fd3b3962f683872495430179b2e17b8d652057
-
Filesize
9B
MD54d28283e4d415600ffc2f8fda6d8c91e
SHA1053dcb8d5d84b75459bc82d8740ee4684d680016
SHA256b855effeaf01610130d3f38de35bc7f98bfc6643d98d4198af18534f048e8df7
SHA51273a758cd5e5ac48d62dd89719be604214895e0cc9a10ff7464a6cf9161a37fd27d15dd2d2565f18198b381ac6442bcb36f38614df7b1176061a83616517a7edb