Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 19:18
Static task
static1
Behavioral task
behavioral1
Sample
4856bbbdfb60b03be5c473cab937a988e0c200fd9e36a7e59cdb7145e48d6f68.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4856bbbdfb60b03be5c473cab937a988e0c200fd9e36a7e59cdb7145e48d6f68.exe
Resource
win10v2004-20240426-en
General
-
Target
4856bbbdfb60b03be5c473cab937a988e0c200fd9e36a7e59cdb7145e48d6f68.exe
-
Size
260KB
-
MD5
e8a5507e3c1c6bf1baf97975fb4fc152
-
SHA1
4142e5547080c1ca2561e4c00e3d96f22f3e0ad7
-
SHA256
4856bbbdfb60b03be5c473cab937a988e0c200fd9e36a7e59cdb7145e48d6f68
-
SHA512
159cc51d0d658ef4c327980001566b794eccafa6625d0f74f06f7b4953cc123c09a665d1fb311b2e088bd5fc6861899c778cb90aff1dfa6f037a0772f7f7c47b
-
SSDEEP
1536:pu3SHuJV9N1ILFkbeumIkA39xSZW175V7UZQJ0UjsWpcdVO4Mqg+aJRaCAd1uhNS:pukuJVL1LRkgUA1nQZwFGVO4Mqg+WDY
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1200 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1932 Logo1_.exe 2672 4856bbbdfb60b03be5c473cab937a988e0c200fd9e36a7e59cdb7145e48d6f68.exe -
Loads dropped DLL 1 IoCs
pid Process 1200 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\policytool.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\cgg\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\HWRCustomization\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\misc.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\bin\plugin2\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\co\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\he\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\InfoPath.en-us\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BLUEPRNT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\ACCWIZ\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Defender\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pa\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\WATER\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\my\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SLATE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\AddInSideAdapters\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Indian\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ga\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\kk\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\COMPASS\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Defender\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Update\Install\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\BrightYellow\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOSYNC.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\uz\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_platform_specific\win_x64\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_platform_specific\win_x64\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\gd\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PPTICO.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\fr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 4856bbbdfb60b03be5c473cab937a988e0c200fd9e36a7e59cdb7145e48d6f68.exe File created C:\Windows\Logo1_.exe 4856bbbdfb60b03be5c473cab937a988e0c200fd9e36a7e59cdb7145e48d6f68.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1932 Logo1_.exe 1932 Logo1_.exe 1932 Logo1_.exe 1932 Logo1_.exe 1932 Logo1_.exe 1932 Logo1_.exe 1932 Logo1_.exe 1932 Logo1_.exe 1932 Logo1_.exe 1932 Logo1_.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2976 wrote to memory of 1200 2976 4856bbbdfb60b03be5c473cab937a988e0c200fd9e36a7e59cdb7145e48d6f68.exe 28 PID 2976 wrote to memory of 1200 2976 4856bbbdfb60b03be5c473cab937a988e0c200fd9e36a7e59cdb7145e48d6f68.exe 28 PID 2976 wrote to memory of 1200 2976 4856bbbdfb60b03be5c473cab937a988e0c200fd9e36a7e59cdb7145e48d6f68.exe 28 PID 2976 wrote to memory of 1200 2976 4856bbbdfb60b03be5c473cab937a988e0c200fd9e36a7e59cdb7145e48d6f68.exe 28 PID 2976 wrote to memory of 1932 2976 4856bbbdfb60b03be5c473cab937a988e0c200fd9e36a7e59cdb7145e48d6f68.exe 29 PID 2976 wrote to memory of 1932 2976 4856bbbdfb60b03be5c473cab937a988e0c200fd9e36a7e59cdb7145e48d6f68.exe 29 PID 2976 wrote to memory of 1932 2976 4856bbbdfb60b03be5c473cab937a988e0c200fd9e36a7e59cdb7145e48d6f68.exe 29 PID 2976 wrote to memory of 1932 2976 4856bbbdfb60b03be5c473cab937a988e0c200fd9e36a7e59cdb7145e48d6f68.exe 29 PID 1932 wrote to memory of 2732 1932 Logo1_.exe 31 PID 1932 wrote to memory of 2732 1932 Logo1_.exe 31 PID 1932 wrote to memory of 2732 1932 Logo1_.exe 31 PID 1932 wrote to memory of 2732 1932 Logo1_.exe 31 PID 2732 wrote to memory of 2304 2732 net.exe 33 PID 2732 wrote to memory of 2304 2732 net.exe 33 PID 2732 wrote to memory of 2304 2732 net.exe 33 PID 2732 wrote to memory of 2304 2732 net.exe 33 PID 1200 wrote to memory of 2672 1200 cmd.exe 34 PID 1200 wrote to memory of 2672 1200 cmd.exe 34 PID 1200 wrote to memory of 2672 1200 cmd.exe 34 PID 1200 wrote to memory of 2672 1200 cmd.exe 34 PID 1200 wrote to memory of 2672 1200 cmd.exe 34 PID 1200 wrote to memory of 2672 1200 cmd.exe 34 PID 1200 wrote to memory of 2672 1200 cmd.exe 34 PID 1932 wrote to memory of 1180 1932 Logo1_.exe 21 PID 1932 wrote to memory of 1180 1932 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1180
-
C:\Users\Admin\AppData\Local\Temp\4856bbbdfb60b03be5c473cab937a988e0c200fd9e36a7e59cdb7145e48d6f68.exe"C:\Users\Admin\AppData\Local\Temp\4856bbbdfb60b03be5c473cab937a988e0c200fd9e36a7e59cdb7145e48d6f68.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a25AA.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\4856bbbdfb60b03be5c473cab937a988e0c200fd9e36a7e59cdb7145e48d6f68.exe"C:\Users\Admin\AppData\Local\Temp\4856bbbdfb60b03be5c473cab937a988e0c200fd9e36a7e59cdb7145e48d6f68.exe"4⤵
- Executes dropped EXE
PID:2672
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2304
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD5124d46b7f68c76494bfeeb9e9d3e4303
SHA1a0839d72d56c3861601a7b773e73b3886ba8961e
SHA256032ded3ade0417f773eeaf28236dc6816da97eac90b13906e4b41a12c38196e2
SHA51223a06ff1b80aa641a5cc7d6bad08da9871e1c08c85ae4168eb42e75cc724a6fba8f317ea7e48c771f088be22d6ae917f6701151712f9d2ef43dbe3e6342a2447
-
Filesize
474KB
MD51ca79e3c2539763b0aaac5de49795afe
SHA12d240aef9a2cce22578f42ebecd3058e37a404a8
SHA256e3e49eceb810b34fc826d70c6556d927a363f29c90b347ee4cfd61d7ba3ff2d9
SHA5124e24d3ebcefa6545d85517bbc5bff3285f85a5967da1642a6e4e53bc2c41efc8b9092a3bbb56c1670b215d623ff5c320bcb06f654ac97482a5dff0da208349e6
-
Filesize
722B
MD5e1b86a9a5a2e5183cb73eef90daf18c6
SHA13148cb9fc587a1886db1def449c4441be332c6dd
SHA2567577f75dd824eabc2c8b925ada0536c67a4fe8226f30c2e4c93c62d0455dbda4
SHA51243886b5c5f45aa052cc59374824b9bfcaa95d54fbe3db570a79c7d70bf39bea0ab260b552e7637bc09e294eabf0f00ef4612baba0d98df8361ea7dbb1aaec7f2
-
C:\Users\Admin\AppData\Local\Temp\4856bbbdfb60b03be5c473cab937a988e0c200fd9e36a7e59cdb7145e48d6f68.exe.exe
Filesize231KB
MD56f581a41167d2d484fcba20e6fc3c39a
SHA1d48de48d24101b9baaa24f674066577e38e6b75c
SHA2563eb8d53778eab9fb13b4c97aeab56e4bad2a6ea3748d342f22eaf4d7aa3185a7
SHA512e1177b6cea89445d58307b3327c78909adff225497f9abb8de571cdd114b547a8f515ec3ab038b583bf752a085b231f6329d6ca82fbe6be8a58cd97a1dbaf0f6
-
Filesize
29KB
MD50efe7c1e7326cc8456e22b0f115ba44d
SHA1a8a195d97d826114b6a7a37e792a975bcedcc935
SHA256f381d1b8a3ccf73a2a757804233b81a87c512b9c0c06f7055ae0819cab55134e
SHA512d00b945ad9914f6702e34109c81fdb2e4236fb3110b145990f48c4cd18d683aee183ff266c805fe2cfe378888f7e328342c318578492c1b0b1c180d398d07122
-
Filesize
9B
MD54d28283e4d415600ffc2f8fda6d8c91e
SHA1053dcb8d5d84b75459bc82d8740ee4684d680016
SHA256b855effeaf01610130d3f38de35bc7f98bfc6643d98d4198af18534f048e8df7
SHA51273a758cd5e5ac48d62dd89719be604214895e0cc9a10ff7464a6cf9161a37fd27d15dd2d2565f18198b381ac6442bcb36f38614df7b1176061a83616517a7edb