Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/05/2024, 23:18
Static task
static1
Behavioral task
behavioral1
Sample
e1608cad6ac31f0580dedb476e451b959927c28206ccf7d25946662bcf89d8a9.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e1608cad6ac31f0580dedb476e451b959927c28206ccf7d25946662bcf89d8a9.exe
Resource
win10v2004-20240508-en
General
-
Target
e1608cad6ac31f0580dedb476e451b959927c28206ccf7d25946662bcf89d8a9.exe
-
Size
1.6MB
-
MD5
00299d55cfd77172abf8cc55a13ae031
-
SHA1
5bc6cac294012f318d5aec6ed9165b758413b540
-
SHA256
e1608cad6ac31f0580dedb476e451b959927c28206ccf7d25946662bcf89d8a9
-
SHA512
3146d9bbce99233824bd9e9d7b32ae56f9af3bedf9a5a7abc73facf39a67789fbc35464a74e44a5b04b057132f152437be8776bdd7695bec3d05767f18781bc1
-
SSDEEP
49152:69VTJHyRQCRsuk/JISsG0VJKSmvhQtNwnZHJgXyGOdg:6URQ7DBISsG0VMSmpQTwtaL7
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1296 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2184 Logo1_.exe 2724 e1608cad6ac31f0580dedb476e451b959927c28206ccf7d25946662bcf89d8a9.exe -
Loads dropped DLL 1 IoCs
pid Process 1296 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\MEIPreload\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\VisualElements\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.flightrecorder_5.5.0.165303\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SLATE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Journal\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\wa\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateSetup.exe Logo1_.exe File created C:\Program Files\Windows Journal\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\in_sidebar\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FormsTemplates\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\MpCmdRun.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\kk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Mail\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\visualization\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Outlook.en-us\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\AXIS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\QUAD\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\ssvagent.exe Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\Computers\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\ext\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\DW\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RMNSQUE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jdb.exe Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\km\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\fonts\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ckb\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\nb\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\STRTEDGE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\tnameserv.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ky\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Journal\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bn\LC_MESSAGES\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe e1608cad6ac31f0580dedb476e451b959927c28206ccf7d25946662bcf89d8a9.exe File created C:\Windows\Logo1_.exe e1608cad6ac31f0580dedb476e451b959927c28206ccf7d25946662bcf89d8a9.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2184 Logo1_.exe 2184 Logo1_.exe 2184 Logo1_.exe 2184 Logo1_.exe 2184 Logo1_.exe 2184 Logo1_.exe 2184 Logo1_.exe 2184 Logo1_.exe 2184 Logo1_.exe 2184 Logo1_.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2724 e1608cad6ac31f0580dedb476e451b959927c28206ccf7d25946662bcf89d8a9.exe 2724 e1608cad6ac31f0580dedb476e451b959927c28206ccf7d25946662bcf89d8a9.exe 2724 e1608cad6ac31f0580dedb476e451b959927c28206ccf7d25946662bcf89d8a9.exe 2724 e1608cad6ac31f0580dedb476e451b959927c28206ccf7d25946662bcf89d8a9.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 2724 e1608cad6ac31f0580dedb476e451b959927c28206ccf7d25946662bcf89d8a9.exe 2724 e1608cad6ac31f0580dedb476e451b959927c28206ccf7d25946662bcf89d8a9.exe 2724 e1608cad6ac31f0580dedb476e451b959927c28206ccf7d25946662bcf89d8a9.exe 2724 e1608cad6ac31f0580dedb476e451b959927c28206ccf7d25946662bcf89d8a9.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2724 e1608cad6ac31f0580dedb476e451b959927c28206ccf7d25946662bcf89d8a9.exe 2724 e1608cad6ac31f0580dedb476e451b959927c28206ccf7d25946662bcf89d8a9.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2752 wrote to memory of 1296 2752 e1608cad6ac31f0580dedb476e451b959927c28206ccf7d25946662bcf89d8a9.exe 28 PID 2752 wrote to memory of 1296 2752 e1608cad6ac31f0580dedb476e451b959927c28206ccf7d25946662bcf89d8a9.exe 28 PID 2752 wrote to memory of 1296 2752 e1608cad6ac31f0580dedb476e451b959927c28206ccf7d25946662bcf89d8a9.exe 28 PID 2752 wrote to memory of 1296 2752 e1608cad6ac31f0580dedb476e451b959927c28206ccf7d25946662bcf89d8a9.exe 28 PID 2752 wrote to memory of 2184 2752 e1608cad6ac31f0580dedb476e451b959927c28206ccf7d25946662bcf89d8a9.exe 29 PID 2752 wrote to memory of 2184 2752 e1608cad6ac31f0580dedb476e451b959927c28206ccf7d25946662bcf89d8a9.exe 29 PID 2752 wrote to memory of 2184 2752 e1608cad6ac31f0580dedb476e451b959927c28206ccf7d25946662bcf89d8a9.exe 29 PID 2752 wrote to memory of 2184 2752 e1608cad6ac31f0580dedb476e451b959927c28206ccf7d25946662bcf89d8a9.exe 29 PID 2184 wrote to memory of 2596 2184 Logo1_.exe 31 PID 2184 wrote to memory of 2596 2184 Logo1_.exe 31 PID 2184 wrote to memory of 2596 2184 Logo1_.exe 31 PID 2184 wrote to memory of 2596 2184 Logo1_.exe 31 PID 2596 wrote to memory of 2604 2596 net.exe 33 PID 2596 wrote to memory of 2604 2596 net.exe 33 PID 2596 wrote to memory of 2604 2596 net.exe 33 PID 2596 wrote to memory of 2604 2596 net.exe 33 PID 1296 wrote to memory of 2724 1296 cmd.exe 34 PID 1296 wrote to memory of 2724 1296 cmd.exe 34 PID 1296 wrote to memory of 2724 1296 cmd.exe 34 PID 1296 wrote to memory of 2724 1296 cmd.exe 34 PID 1296 wrote to memory of 2724 1296 cmd.exe 34 PID 1296 wrote to memory of 2724 1296 cmd.exe 34 PID 1296 wrote to memory of 2724 1296 cmd.exe 34 PID 2184 wrote to memory of 1200 2184 Logo1_.exe 21 PID 2184 wrote to memory of 1200 2184 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\e1608cad6ac31f0580dedb476e451b959927c28206ccf7d25946662bcf89d8a9.exe"C:\Users\Admin\AppData\Local\Temp\e1608cad6ac31f0580dedb476e451b959927c28206ccf7d25946662bcf89d8a9.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a27CC.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Users\Admin\AppData\Local\Temp\e1608cad6ac31f0580dedb476e451b959927c28206ccf7d25946662bcf89d8a9.exe"C:\Users\Admin\AppData\Local\Temp\e1608cad6ac31f0580dedb476e451b959927c28206ccf7d25946662bcf89d8a9.exe"4⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2724
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2604
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD5c2313644c3961c77fb35668603775f6b
SHA134857a41ad8b6ce8f1458615465a73c8ef5b5e49
SHA256fd99eadf4c8d7924770f0969d9f847d74e965cac870b846ed737eff514b7fd64
SHA512272443283ed7073bf9ce4fac0b94ff80fdbe92cd70c310904b81306d555abb0c71f712488fa49c58a0c95f7510ede226c4f40f7a7214d4c99e37fdd8a4bc0f9d
-
Filesize
474KB
MD56eabc463f8025a7e6e65f38cba22f126
SHA13e430ee5ec01c5509ed750b88d3473e7990dfe95
SHA256cc8da3ecd355b519d81415d279ed037c725ba221bf323d250aa92ee2b2b88ca7
SHA512c8fde7026ac8633403bbefee4b044457184388fb7343d8c46f5f7f272724227976bf485ea91da49e2a85dd0cfb73f260ac705d8007333dd3e5539fe5ed67e3ab
-
Filesize
722B
MD5b4dbdb21bf6aab2eaef82cb2b45c4e4d
SHA1844b237897851a2b472e8d9dfa122daff26019c4
SHA256b9549517e27c7df7919875e93f5db2c7aef671211e2689f7407a6df1ac7d5faa
SHA5125920ee55577f9833fe587b08da03baed155200e039a9bf9a6994650e24f0e93ea5b673747f80da5ab60ec0bc2e80bb474bf94068ef373d15e55a1407b8305a86
-
C:\Users\Admin\AppData\Local\Temp\e1608cad6ac31f0580dedb476e451b959927c28206ccf7d25946662bcf89d8a9.exe.exe
Filesize1.6MB
MD5ada617b0cdf2bcd08558a99814d465c4
SHA1cc098290554d4e9bd1bd1009f2474cc06866cff6
SHA2565f2b689531b9eda96489442b000cf3203af38838c71fc10229db9b375e3c1055
SHA512b5b49f41258e5e6c8254bd4204a550a26b447de15d1ba78b7fd24f99938e3b4778037264ac6e2e5c0c45c59efa5b87ccfc68f05f70ec6ad0e329d5bede8bbcdf
-
Filesize
29KB
MD5599a7881ecc7bdb52e885c2f88f39623
SHA1f1e4628628939c353e3f51e46dd638c844db0588
SHA256e54026cfa7a56a1cdbe7c78228b9d123e8e7f8f1044609385e1990bc4091872d
SHA51268542351fa49e3ace39596d63e89b24ae31f3cb6a27f315bd7922aa8ff17601da5663e3c25e802154d5e97bcfdb569365372ad32cb2459485373d574fe1809ba
-
Filesize
9B
MD5626b7ac8db42922bd5ad061459a997cd
SHA11d94c0679bc448cde1fc2da8cea39b910af74f3b
SHA256ec459940188be916789d5d79bd7826fecb6ad8f47d606e862d95946998d36208
SHA512cff25aa56e8d7d33dddf326fe1fdc1fc11e4269e0b03caa2f8baa637a549b1e0878ea933333cc82c03fb3930d0ae1b8735bfdbf1337e696b5bd062b693847f20