Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
24/05/2024, 21:39
Static task
static1
Behavioral task
behavioral1
Sample
fb03215045eb8fcb9d6c6ff807dd3f69ccde59000bad163d7e5f67ac05a1f277.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
fb03215045eb8fcb9d6c6ff807dd3f69ccde59000bad163d7e5f67ac05a1f277.exe
Resource
win10v2004-20240508-en
General
-
Target
fb03215045eb8fcb9d6c6ff807dd3f69ccde59000bad163d7e5f67ac05a1f277.exe
-
Size
484KB
-
MD5
88977142bdfb752a1cb0a518e7ecffdf
-
SHA1
5bab0edb5850e0dfd4980fbd0cc732535e69cc1b
-
SHA256
fb03215045eb8fcb9d6c6ff807dd3f69ccde59000bad163d7e5f67ac05a1f277
-
SHA512
6e651f6f647972b06a9960a9fedc6ef4d5d819170aca85a89791d11366ad7d7982c1e3426b38fc9cd7c6da4675ab1890c6035072b666c1c9bf483e4eaa1112fd
-
SSDEEP
6144:lVfjmNIz1gL5pRTMTTjMkId/BynSx7dEe6XwzRaktNP08NhKs39zo43fTtl1fay7:D7+G1gL5pRTcAkS/3hzN8qE43fm78V
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2212 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2336 Logo1_.exe 2664 fb03215045eb8fcb9d6c6ff807dd3f69ccde59000bad163d7e5f67ac05a1f277.exe -
Loads dropped DLL 1 IoCs
pid Process 2212 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\More Games\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GROOVEMN.EXE Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\misc\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Purble Place\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pt_BR\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\PublicAssemblies\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Minesweeper\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\or\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\LISTS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jabswitch.exe Logo1_.exe File created C:\Program Files\Microsoft Games\Purble Place\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\gl\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Notebook Templates\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Update\Offline\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Lime\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ru\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ar\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\ext\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\Modules\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\da\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\oc\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\stream_filter\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe AIR Application Installer.exe Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ug\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\WORDICON.EXE Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmap.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk16\windows-amd64\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\FreeCell\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\ja\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Document Parts\1033\14\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Checkers\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\America\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe fb03215045eb8fcb9d6c6ff807dd3f69ccde59000bad163d7e5f67ac05a1f277.exe File created C:\Windows\Logo1_.exe fb03215045eb8fcb9d6c6ff807dd3f69ccde59000bad163d7e5f67ac05a1f277.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2336 Logo1_.exe 2336 Logo1_.exe 2336 Logo1_.exe 2336 Logo1_.exe 2336 Logo1_.exe 2336 Logo1_.exe 2336 Logo1_.exe 2336 Logo1_.exe 2336 Logo1_.exe 2336 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2212 2200 fb03215045eb8fcb9d6c6ff807dd3f69ccde59000bad163d7e5f67ac05a1f277.exe 28 PID 2200 wrote to memory of 2212 2200 fb03215045eb8fcb9d6c6ff807dd3f69ccde59000bad163d7e5f67ac05a1f277.exe 28 PID 2200 wrote to memory of 2212 2200 fb03215045eb8fcb9d6c6ff807dd3f69ccde59000bad163d7e5f67ac05a1f277.exe 28 PID 2200 wrote to memory of 2212 2200 fb03215045eb8fcb9d6c6ff807dd3f69ccde59000bad163d7e5f67ac05a1f277.exe 28 PID 2200 wrote to memory of 2336 2200 fb03215045eb8fcb9d6c6ff807dd3f69ccde59000bad163d7e5f67ac05a1f277.exe 30 PID 2200 wrote to memory of 2336 2200 fb03215045eb8fcb9d6c6ff807dd3f69ccde59000bad163d7e5f67ac05a1f277.exe 30 PID 2200 wrote to memory of 2336 2200 fb03215045eb8fcb9d6c6ff807dd3f69ccde59000bad163d7e5f67ac05a1f277.exe 30 PID 2200 wrote to memory of 2336 2200 fb03215045eb8fcb9d6c6ff807dd3f69ccde59000bad163d7e5f67ac05a1f277.exe 30 PID 2336 wrote to memory of 1840 2336 Logo1_.exe 31 PID 2336 wrote to memory of 1840 2336 Logo1_.exe 31 PID 2336 wrote to memory of 1840 2336 Logo1_.exe 31 PID 2336 wrote to memory of 1840 2336 Logo1_.exe 31 PID 2212 wrote to memory of 2664 2212 cmd.exe 33 PID 2212 wrote to memory of 2664 2212 cmd.exe 33 PID 2212 wrote to memory of 2664 2212 cmd.exe 33 PID 2212 wrote to memory of 2664 2212 cmd.exe 33 PID 1840 wrote to memory of 2648 1840 net.exe 34 PID 1840 wrote to memory of 2648 1840 net.exe 34 PID 1840 wrote to memory of 2648 1840 net.exe 34 PID 1840 wrote to memory of 2648 1840 net.exe 34 PID 2336 wrote to memory of 1372 2336 Logo1_.exe 21 PID 2336 wrote to memory of 1372 2336 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\fb03215045eb8fcb9d6c6ff807dd3f69ccde59000bad163d7e5f67ac05a1f277.exe"C:\Users\Admin\AppData\Local\Temp\fb03215045eb8fcb9d6c6ff807dd3f69ccde59000bad163d7e5f67ac05a1f277.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a5AC.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\fb03215045eb8fcb9d6c6ff807dd3f69ccde59000bad163d7e5f67ac05a1f277.exe"C:\Users\Admin\AppData\Local\Temp\fb03215045eb8fcb9d6c6ff807dd3f69ccde59000bad163d7e5f67ac05a1f277.exe"4⤵
- Executes dropped EXE
PID:2664
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2648
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD52cbf0e13c88dcc4a4f21740219dfc1e5
SHA1c00dbe095e29b77221963148de962312fa51f178
SHA25634af897488657539915345a48106d1dec508abbb3d7867e97d1f59440fe98184
SHA5128929533a3787dc7e2958b6d2a08a2de069e5732cef2187b87c1d7437798091dccf47f7f9d7bdf7ab68c92d97f578d2c24dc5276136a20446d22d1b32085e83a6
-
Filesize
471KB
MD5c6c8fde27f649c91ddaab8cb9ca344a6
SHA15e4865aec432a18107182f47edda176e8c566152
SHA25632c3fed53bfc1d890e9bd1d771fdc7e2c81480e03f1425bce07b4045a192d100
SHA512a8df7d1e852d871d7f16bae10c4ff049359583da88cc85a039f0298525839040d5363ce5ef4cbdb92a12a25785f73df83cf0df07752b78e6e6444f32160a2155
-
Filesize
721B
MD534e876e8a5dc604d15c82e6767dd9576
SHA139f4e90a0f249c1555084a0aa9280f0feba9cb34
SHA2568e7048882dbaef2c67fea7c1c81bb0e801e2d0e0e941670b3c06c78550e330f6
SHA51236362cd3fc2cbf5a9d70ae0b8f335c7d155fa1d695879797319864dbf7b6206f8aa98c4633dda17c9b9e2acb127c5066468a727f425b23d2b20e07b462868ca0
-
C:\Users\Admin\AppData\Local\Temp\fb03215045eb8fcb9d6c6ff807dd3f69ccde59000bad163d7e5f67ac05a1f277.exe.exe
Filesize458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
Filesize
26KB
MD56bb917e54f07b1f77de86ee02cc2fdca
SHA133c02d2bdacdad19592f68bc30375f798facb53b
SHA256a5076f4ef41e1596ea6b5c37d19ad811af1ac9c659a3a6dc1599bb1b4dbaff80
SHA5121358692ff3b0b2f419bd0fe528294bdba5eee70985ac1aa73a6635b7a30bc471500945d0d82ba1854c087e3097a16e9cebc8ddb7fa4fda3d5fd5a4dfe95ff6b0
-
Filesize
9B
MD5304501c003da3bc5756aa53a757c30cc
SHA194dfcea0ef17f89b3a60a85a07edb4c00170cc1c
SHA2569f4b03cbd52378f329bfc7088f8242bbc1a0a2754bc2f8a40e3b74e0dedecd6e
SHA51278cd3c2cb4cb66e41d8947e1231256c2043d71c77f97e92915e938a6c1d9a8c003512027d98bc71bf582875d269e5fbe6e134f57b25f5f79fe16f9a412387dc8