Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 10:24
Static task
static1
Behavioral task
behavioral1
Sample
385a65b42d6880de9ac97bbf07b3f52a3c3cc133ac93a603eaef102f50b29ac0.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
385a65b42d6880de9ac97bbf07b3f52a3c3cc133ac93a603eaef102f50b29ac0.exe
Resource
win10v2004-20240426-en
General
-
Target
385a65b42d6880de9ac97bbf07b3f52a3c3cc133ac93a603eaef102f50b29ac0.exe
-
Size
68KB
-
MD5
281bc3b12f7e2a922492c15b367d89e4
-
SHA1
ccbd846027c2d899e7f2fb9f6ef893a4d38e9195
-
SHA256
385a65b42d6880de9ac97bbf07b3f52a3c3cc133ac93a603eaef102f50b29ac0
-
SHA512
df003be859a274108f5394e732e70cbfa50b0ece206d86d11d13db564b364b2808295a7d6e34ba4b2fd90c5d7fd4ac56f9906b53169d2198793af1d22e0bcfd7
-
SSDEEP
1536:Kw3SHmLKarIpYeEToa9D4ZQKbgZi1dst7x9PxQ:KwkF3pdlZQKbgZi1St7xQ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2440 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 3028 Logo1_.exe 2272 385a65b42d6880de9ac97bbf07b3f52a3c3cc133ac93a603eaef102f50b29ac0.exe -
Loads dropped DLL 1 IoCs
pid Process 2440 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Portal\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FormsTemplates\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\BrightYellow\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\ENES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Proof.es\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Defender\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Lime\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\nn\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\HostSideAdapters\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Hearts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\ja\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\gu\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\applet\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\MSASCui.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SPRING\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\Offline\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\1033\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fi\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Defender\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Lime\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Updater6\Adobe_Updater.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fa\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\is\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BLUECALM\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\1042\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\9.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\1031\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\ext\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SLATE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\id\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\dialogs\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\Contracts\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolIcons\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\Visualizations\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveDocumentReview\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Purble Place\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\da\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\SpiderSolitaire\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\eo\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe Logo1_.exe File created C:\Program Files (x86)\Internet Explorer\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Desert\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Logo1_.exe 385a65b42d6880de9ac97bbf07b3f52a3c3cc133ac93a603eaef102f50b29ac0.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 385a65b42d6880de9ac97bbf07b3f52a3c3cc133ac93a603eaef102f50b29ac0.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3028 Logo1_.exe 3028 Logo1_.exe 3028 Logo1_.exe 3028 Logo1_.exe 3028 Logo1_.exe 3028 Logo1_.exe 3028 Logo1_.exe 3028 Logo1_.exe 3028 Logo1_.exe 3028 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1792 wrote to memory of 2440 1792 385a65b42d6880de9ac97bbf07b3f52a3c3cc133ac93a603eaef102f50b29ac0.exe 28 PID 1792 wrote to memory of 2440 1792 385a65b42d6880de9ac97bbf07b3f52a3c3cc133ac93a603eaef102f50b29ac0.exe 28 PID 1792 wrote to memory of 2440 1792 385a65b42d6880de9ac97bbf07b3f52a3c3cc133ac93a603eaef102f50b29ac0.exe 28 PID 1792 wrote to memory of 2440 1792 385a65b42d6880de9ac97bbf07b3f52a3c3cc133ac93a603eaef102f50b29ac0.exe 28 PID 1792 wrote to memory of 3028 1792 385a65b42d6880de9ac97bbf07b3f52a3c3cc133ac93a603eaef102f50b29ac0.exe 29 PID 1792 wrote to memory of 3028 1792 385a65b42d6880de9ac97bbf07b3f52a3c3cc133ac93a603eaef102f50b29ac0.exe 29 PID 1792 wrote to memory of 3028 1792 385a65b42d6880de9ac97bbf07b3f52a3c3cc133ac93a603eaef102f50b29ac0.exe 29 PID 1792 wrote to memory of 3028 1792 385a65b42d6880de9ac97bbf07b3f52a3c3cc133ac93a603eaef102f50b29ac0.exe 29 PID 3028 wrote to memory of 2684 3028 Logo1_.exe 30 PID 3028 wrote to memory of 2684 3028 Logo1_.exe 30 PID 3028 wrote to memory of 2684 3028 Logo1_.exe 30 PID 3028 wrote to memory of 2684 3028 Logo1_.exe 30 PID 2684 wrote to memory of 2672 2684 net.exe 33 PID 2684 wrote to memory of 2672 2684 net.exe 33 PID 2684 wrote to memory of 2672 2684 net.exe 33 PID 2684 wrote to memory of 2672 2684 net.exe 33 PID 2440 wrote to memory of 2272 2440 cmd.exe 34 PID 2440 wrote to memory of 2272 2440 cmd.exe 34 PID 2440 wrote to memory of 2272 2440 cmd.exe 34 PID 2440 wrote to memory of 2272 2440 cmd.exe 34 PID 3028 wrote to memory of 1196 3028 Logo1_.exe 21 PID 3028 wrote to memory of 1196 3028 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\385a65b42d6880de9ac97bbf07b3f52a3c3cc133ac93a603eaef102f50b29ac0.exe"C:\Users\Admin\AppData\Local\Temp\385a65b42d6880de9ac97bbf07b3f52a3c3cc133ac93a603eaef102f50b29ac0.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a162F.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\385a65b42d6880de9ac97bbf07b3f52a3c3cc133ac93a603eaef102f50b29ac0.exe"C:\Users\Admin\AppData\Local\Temp\385a65b42d6880de9ac97bbf07b3f52a3c3cc133ac93a603eaef102f50b29ac0.exe"4⤵
- Executes dropped EXE
PID:2272
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2672
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
472KB
MD588eb1bca8c399bc3f46e99cdde2f047e
SHA155fafbceb011e1af2edced978686a90971bd95f2
SHA25642fd78c05bc240d4ded16ac974f17c336f6ae3a1814d548021c48a942cc30428
SHA512149d4de0c024e25a13a7bb17471e6f48391d4f26b1c8388672320eed1c255f84219ad7b72bbebc531ae558d5192dd4bb6d0dddd6c65a45300c8e8348a4fb3728
-
Filesize
722B
MD5a55a9f479ef96c6e32bc9c8bac1a1298
SHA15d3143657ba3f13140fbf105f35aecc000a44273
SHA25639c66348d9d902a256ddf4d02229a666984c50d1f13245565c9c0bab00017f48
SHA512d5bfbfae226771d6ada8b5c5e620c6d437d0ca0787a54d613be2faa2e74f74a379f541ef9e2b1a89bbde773d8c78af00501e46ee319369eb359cf5c6e98d42bf
-
C:\Users\Admin\AppData\Local\Temp\385a65b42d6880de9ac97bbf07b3f52a3c3cc133ac93a603eaef102f50b29ac0.exe.exe
Filesize41KB
MD5977e405c109268909fd24a94cc23d4f0
SHA1af5d032c2b6caa2164cf298e95b09060665c4188
SHA256cd24c61fe7dc3896c6c928c92a2adc58fab0a3ff61ef7ddcac1ba794182ab12f
SHA51212b4b59c1a8e65e72aa07ee4b6b6cd9fdedead01d5ce8e30f16ca26b5d733655e23a71c1d273a950a5b1a6cce810b696612de4a1148ac5f468ddf05d4549eed5
-
Filesize
27KB
MD50fa9b762c072997debe981205bf75ecc
SHA14768461163d7ffdb54161187b25ad1db0e078c1b
SHA2566fea15427f63e3155ae96ce05cec1f467d249688c23751455ff8e5584db0f244
SHA512c52a8a23c8e71003dd5436867674ded64b1b0dea1200ce3406e98e5a0d244e58066ce7dc66b126561c7192c26b919cf93dd16abe80eefa394d437c1d65d958c6
-
Filesize
9B
MD59d187c446579e70f430c5bb5556efc0c
SHA10379a56b3d4a9e75d426a088cd523d01929186b2
SHA256544ddbeef004b81b45d0e94b3b745247127ea912498b2037a66e1b9e896ab85f
SHA5126844cb10d0d40b145129edd38157ede9fdb8dacf2c8a0888c7478ff1d0346e5dfd451bb297aea18097330751ae7520761e4a51804b8fb60c19541b97c600ddbc