Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20/05/2024, 18:28
Static task
static1
Behavioral task
behavioral1
Sample
bb7dd31ab165d1e3d427bc0e9b9d33bbd23a286d8b6d4360cbbe3f4a22fe23a2.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
bb7dd31ab165d1e3d427bc0e9b9d33bbd23a286d8b6d4360cbbe3f4a22fe23a2.exe
Resource
win10v2004-20240508-en
General
-
Target
bb7dd31ab165d1e3d427bc0e9b9d33bbd23a286d8b6d4360cbbe3f4a22fe23a2.exe
-
Size
88KB
-
MD5
ab054d5ffb9c058402e9375e28840f22
-
SHA1
88f5df08335ddaffdbab6aca65cda6b51d85643b
-
SHA256
bb7dd31ab165d1e3d427bc0e9b9d33bbd23a286d8b6d4360cbbe3f4a22fe23a2
-
SHA512
5cf3ed305e4398c98698c8032d7986040f95b816181eed0f07a6be4ff7503a6eecf75df28cbdee3547378d6c89d782c432afd73a505e468fbe4b8777ce872c3a
-
SSDEEP
1536:ppF3SHuJV9Ntyapmebn4ddJZeY86iLflLJYEIs67rxo:ppFkuJVL8LK4ddJMY86ipmns6S
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2648 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2716 Logo1_.exe 2240 bb7dd31ab165d1e3d427bc0e9b9d33bbd23a286d8b6d4360cbbe3f4a22fe23a2.exe -
Loads dropped DLL 1 IoCs
pid Process 2648 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE Logo1_.exe File created C:\Program Files\Microsoft Games\More Games\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\template.exe Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Access.en-us\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\Packages\Debugger\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\Contracts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Updater6\Adobe_Updater.exe Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ECLIPSE\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\meta_engine\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\ENFR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\FreeCell\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sl\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Internet Explorer\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\security\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\my\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\SpringGreen\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ieinstal.exe Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Publisher.en-us\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tt\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\jfr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TextConv\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\A3DUtility.exe Logo1_.exe File created C:\Program Files\Microsoft Games\Solitaire\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\eu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\resources\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\Bin\1033\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Web Folders\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\excelcnv.exe Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\schema\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\images\cursors\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\gl\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\te\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TextConv\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CNFNOT32.EXE Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\More Games\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\el\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nl\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\it-IT\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe bb7dd31ab165d1e3d427bc0e9b9d33bbd23a286d8b6d4360cbbe3f4a22fe23a2.exe File created C:\Windows\Logo1_.exe bb7dd31ab165d1e3d427bc0e9b9d33bbd23a286d8b6d4360cbbe3f4a22fe23a2.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2716 Logo1_.exe 2716 Logo1_.exe 2716 Logo1_.exe 2716 Logo1_.exe 2716 Logo1_.exe 2716 Logo1_.exe 2716 Logo1_.exe 2716 Logo1_.exe 2716 Logo1_.exe 2716 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2904 wrote to memory of 2648 2904 bb7dd31ab165d1e3d427bc0e9b9d33bbd23a286d8b6d4360cbbe3f4a22fe23a2.exe 28 PID 2904 wrote to memory of 2648 2904 bb7dd31ab165d1e3d427bc0e9b9d33bbd23a286d8b6d4360cbbe3f4a22fe23a2.exe 28 PID 2904 wrote to memory of 2648 2904 bb7dd31ab165d1e3d427bc0e9b9d33bbd23a286d8b6d4360cbbe3f4a22fe23a2.exe 28 PID 2904 wrote to memory of 2648 2904 bb7dd31ab165d1e3d427bc0e9b9d33bbd23a286d8b6d4360cbbe3f4a22fe23a2.exe 28 PID 2904 wrote to memory of 2716 2904 bb7dd31ab165d1e3d427bc0e9b9d33bbd23a286d8b6d4360cbbe3f4a22fe23a2.exe 29 PID 2904 wrote to memory of 2716 2904 bb7dd31ab165d1e3d427bc0e9b9d33bbd23a286d8b6d4360cbbe3f4a22fe23a2.exe 29 PID 2904 wrote to memory of 2716 2904 bb7dd31ab165d1e3d427bc0e9b9d33bbd23a286d8b6d4360cbbe3f4a22fe23a2.exe 29 PID 2904 wrote to memory of 2716 2904 bb7dd31ab165d1e3d427bc0e9b9d33bbd23a286d8b6d4360cbbe3f4a22fe23a2.exe 29 PID 2716 wrote to memory of 2688 2716 Logo1_.exe 31 PID 2716 wrote to memory of 2688 2716 Logo1_.exe 31 PID 2716 wrote to memory of 2688 2716 Logo1_.exe 31 PID 2716 wrote to memory of 2688 2716 Logo1_.exe 31 PID 2688 wrote to memory of 2612 2688 net.exe 33 PID 2688 wrote to memory of 2612 2688 net.exe 33 PID 2688 wrote to memory of 2612 2688 net.exe 33 PID 2688 wrote to memory of 2612 2688 net.exe 33 PID 2648 wrote to memory of 2240 2648 cmd.exe 34 PID 2648 wrote to memory of 2240 2648 cmd.exe 34 PID 2648 wrote to memory of 2240 2648 cmd.exe 34 PID 2648 wrote to memory of 2240 2648 cmd.exe 34 PID 2716 wrote to memory of 1204 2716 Logo1_.exe 21 PID 2716 wrote to memory of 1204 2716 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\bb7dd31ab165d1e3d427bc0e9b9d33bbd23a286d8b6d4360cbbe3f4a22fe23a2.exe"C:\Users\Admin\AppData\Local\Temp\bb7dd31ab165d1e3d427bc0e9b9d33bbd23a286d8b6d4360cbbe3f4a22fe23a2.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a2D86.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\bb7dd31ab165d1e3d427bc0e9b9d33bbd23a286d8b6d4360cbbe3f4a22fe23a2.exe"C:\Users\Admin\AppData\Local\Temp\bb7dd31ab165d1e3d427bc0e9b9d33bbd23a286d8b6d4360cbbe3f4a22fe23a2.exe"4⤵
- Executes dropped EXE
PID:2240
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2612
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD559b7aae3cb37d1edacd55159253dd510
SHA1ceabb6ffbb679732784c01f9d3631898546043a6
SHA25644ead1f1ed8b1136baf384c692ebd3547d6d7a9a2398dc32774f625ad3849dd9
SHA512d1679594a2f6417c01602781436b8766af5f7c470f500885e7bf74ec60e9006741aad5c164e3088a0785f3ff3b5d91ac91325c29e9d51b0abbbb24cdda6ea778
-
Filesize
474KB
MD56eabc463f8025a7e6e65f38cba22f126
SHA13e430ee5ec01c5509ed750b88d3473e7990dfe95
SHA256cc8da3ecd355b519d81415d279ed037c725ba221bf323d250aa92ee2b2b88ca7
SHA512c8fde7026ac8633403bbefee4b044457184388fb7343d8c46f5f7f272724227976bf485ea91da49e2a85dd0cfb73f260ac705d8007333dd3e5539fe5ed67e3ab
-
Filesize
722B
MD5f1f9b8c8f88a1ae15905d018be2b1eb0
SHA1e9ea7bad1483634b821ea9351a140975be4cbb86
SHA256f20b92a14a5604b14eca13a5225b879021d383bbfc05f92c3f8253b6dfd8b705
SHA5124214e386e6302a274389580835f249c2d51d8ab4d039fefa8c3c62e655ee2a4132dcdbab4cde7f182129987400d8c4fbc206d22c2e12b8a4336938cd8c0701ed
-
C:\Users\Admin\AppData\Local\Temp\bb7dd31ab165d1e3d427bc0e9b9d33bbd23a286d8b6d4360cbbe3f4a22fe23a2.exe.exe
Filesize59KB
MD5dfc18f7068913dde25742b856788d7ca
SHA1cbaa23f782c2ddcd7c9ff024fd0b096952a2b387
SHA256ff4ac75c02247000da084de006c214d3dd3583867bd3533ba788e22734c7a2bf
SHA512d0c7ec1dae41a803325b51c12490c355ed779d297daa35247889950491e52427810132f0829fc7ffa3022f1a106f4e4ba78ed612223395313a6f267e9ab24945
-
Filesize
29KB
MD587e1376a8f4d0187c9cd966e5387fba6
SHA158bdbcb537922706c165607eaf003f2189bc99d3
SHA256f232f879c9a948f3a8697062e75ed55b0e34c10b4c9aa164f90a8a12e0816895
SHA51233219331ace9c8f8ab0a670c9a1f264dfe5e6b50443922d8dac485cd7dc4fd8b63321433c555d6484e038e04985656ce417b4b7a8ffbd8c43b2ad8a7c45dbff4
-
Filesize
9B
MD5917c6bf65db2dfa12e70e5aa6a061a01
SHA1bd0d9f217fd74efd784ad4a1b41f330b36e64edf
SHA2568ad43ce062fe590809844ebdf64f2eb0f7d32357c89baac5640ff132dfcfdd19
SHA51221a71205a9abfafcf7fef2a1697ae78a6fe14591bef85f86137d5355b5d40e1b8ca810e351256e0dc2973677e9b4452014126d3e5e81b0c3f1fcbd1a087481cb