Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
25/05/2024, 04:38
Static task
static1
Behavioral task
behavioral1
Sample
5c77dc74765c0500f1023136ee097d938ef4da166a4874db26040e69dfeac992.exe
Resource
win7-20240508-en
General
-
Target
5c77dc74765c0500f1023136ee097d938ef4da166a4874db26040e69dfeac992.exe
-
Size
583KB
-
MD5
3d13b844d2a2527640ed50d8da94b7b5
-
SHA1
77566d99b9a2938fdabcb84172496ff62957ad5a
-
SHA256
5c77dc74765c0500f1023136ee097d938ef4da166a4874db26040e69dfeac992
-
SHA512
72c8328aa9adf34c0fbc70a08a89fdb807b5b8fd19f35658d2a63f1044545668a21e0f973bbdf25221da9a8e93ccc5c6db4786d0a4702873a631e5a54adeaf92
-
SSDEEP
6144:mEKW+aezDE7cV3iwbAFRWAbd4nf0H05yqE6Hl0ChW0+ksllAXBu0lWGWUJJQ4t0G:m9W+aB7a3iwbihym2g7XO3LWUQfh4Co
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2612 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2600 Logo1_.exe 2588 5c77dc74765c0500f1023136ee097d938ef4da166a4874db26040e69dfeac992.exe -
Loads dropped DLL 1 IoCs
pid Process 2612 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\brx\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\skins\fonts\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\EQUATION\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Journal\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SLATE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\WksConv\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\Office14\MSOHTMED.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\MSOICONS.EXE Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TextConv\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSClientDataMgr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\cgg\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sr\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Photo Viewer\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdate.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hr\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Triedit\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Effects\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\Accessories\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\mr\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pt_BR\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_chroma\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Defender\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\he\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Services\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\servertool.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ka\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\lg\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\Setup.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\core\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Mozilla Firefox\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\am\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\pl\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\kinit.exe Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\es\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\Accessories\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\it-IT\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 5c77dc74765c0500f1023136ee097d938ef4da166a4874db26040e69dfeac992.exe File created C:\Windows\Logo1_.exe 5c77dc74765c0500f1023136ee097d938ef4da166a4874db26040e69dfeac992.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 2056 5c77dc74765c0500f1023136ee097d938ef4da166a4874db26040e69dfeac992.exe 2056 5c77dc74765c0500f1023136ee097d938ef4da166a4874db26040e69dfeac992.exe 2056 5c77dc74765c0500f1023136ee097d938ef4da166a4874db26040e69dfeac992.exe 2056 5c77dc74765c0500f1023136ee097d938ef4da166a4874db26040e69dfeac992.exe 2056 5c77dc74765c0500f1023136ee097d938ef4da166a4874db26040e69dfeac992.exe 2056 5c77dc74765c0500f1023136ee097d938ef4da166a4874db26040e69dfeac992.exe 2056 5c77dc74765c0500f1023136ee097d938ef4da166a4874db26040e69dfeac992.exe 2056 5c77dc74765c0500f1023136ee097d938ef4da166a4874db26040e69dfeac992.exe 2056 5c77dc74765c0500f1023136ee097d938ef4da166a4874db26040e69dfeac992.exe 2056 5c77dc74765c0500f1023136ee097d938ef4da166a4874db26040e69dfeac992.exe 2056 5c77dc74765c0500f1023136ee097d938ef4da166a4874db26040e69dfeac992.exe 2056 5c77dc74765c0500f1023136ee097d938ef4da166a4874db26040e69dfeac992.exe 2056 5c77dc74765c0500f1023136ee097d938ef4da166a4874db26040e69dfeac992.exe 2600 Logo1_.exe 2600 Logo1_.exe 2600 Logo1_.exe 2600 Logo1_.exe 2600 Logo1_.exe 2600 Logo1_.exe 2600 Logo1_.exe 2600 Logo1_.exe 2600 Logo1_.exe 2600 Logo1_.exe 2600 Logo1_.exe 2600 Logo1_.exe 2600 Logo1_.exe 2600 Logo1_.exe 2600 Logo1_.exe 2600 Logo1_.exe 2600 Logo1_.exe 2600 Logo1_.exe 2600 Logo1_.exe 2600 Logo1_.exe 2600 Logo1_.exe 2600 Logo1_.exe 2600 Logo1_.exe 2600 Logo1_.exe 2600 Logo1_.exe 2600 Logo1_.exe 2600 Logo1_.exe 2600 Logo1_.exe 2600 Logo1_.exe 2600 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2056 wrote to memory of 1608 2056 5c77dc74765c0500f1023136ee097d938ef4da166a4874db26040e69dfeac992.exe 28 PID 2056 wrote to memory of 1608 2056 5c77dc74765c0500f1023136ee097d938ef4da166a4874db26040e69dfeac992.exe 28 PID 2056 wrote to memory of 1608 2056 5c77dc74765c0500f1023136ee097d938ef4da166a4874db26040e69dfeac992.exe 28 PID 2056 wrote to memory of 1608 2056 5c77dc74765c0500f1023136ee097d938ef4da166a4874db26040e69dfeac992.exe 28 PID 1608 wrote to memory of 2820 1608 net.exe 30 PID 1608 wrote to memory of 2820 1608 net.exe 30 PID 1608 wrote to memory of 2820 1608 net.exe 30 PID 1608 wrote to memory of 2820 1608 net.exe 30 PID 2056 wrote to memory of 2612 2056 5c77dc74765c0500f1023136ee097d938ef4da166a4874db26040e69dfeac992.exe 31 PID 2056 wrote to memory of 2612 2056 5c77dc74765c0500f1023136ee097d938ef4da166a4874db26040e69dfeac992.exe 31 PID 2056 wrote to memory of 2612 2056 5c77dc74765c0500f1023136ee097d938ef4da166a4874db26040e69dfeac992.exe 31 PID 2056 wrote to memory of 2612 2056 5c77dc74765c0500f1023136ee097d938ef4da166a4874db26040e69dfeac992.exe 31 PID 2056 wrote to memory of 2600 2056 5c77dc74765c0500f1023136ee097d938ef4da166a4874db26040e69dfeac992.exe 32 PID 2056 wrote to memory of 2600 2056 5c77dc74765c0500f1023136ee097d938ef4da166a4874db26040e69dfeac992.exe 32 PID 2056 wrote to memory of 2600 2056 5c77dc74765c0500f1023136ee097d938ef4da166a4874db26040e69dfeac992.exe 32 PID 2056 wrote to memory of 2600 2056 5c77dc74765c0500f1023136ee097d938ef4da166a4874db26040e69dfeac992.exe 32 PID 2600 wrote to memory of 2672 2600 Logo1_.exe 34 PID 2600 wrote to memory of 2672 2600 Logo1_.exe 34 PID 2600 wrote to memory of 2672 2600 Logo1_.exe 34 PID 2600 wrote to memory of 2672 2600 Logo1_.exe 34 PID 2672 wrote to memory of 2620 2672 net.exe 36 PID 2672 wrote to memory of 2620 2672 net.exe 36 PID 2672 wrote to memory of 2620 2672 net.exe 36 PID 2672 wrote to memory of 2620 2672 net.exe 36 PID 2612 wrote to memory of 2588 2612 cmd.exe 37 PID 2612 wrote to memory of 2588 2612 cmd.exe 37 PID 2612 wrote to memory of 2588 2612 cmd.exe 37 PID 2612 wrote to memory of 2588 2612 cmd.exe 37 PID 2600 wrote to memory of 2664 2600 Logo1_.exe 38 PID 2600 wrote to memory of 2664 2600 Logo1_.exe 38 PID 2600 wrote to memory of 2664 2600 Logo1_.exe 38 PID 2600 wrote to memory of 2664 2600 Logo1_.exe 38 PID 2664 wrote to memory of 2960 2664 net.exe 40 PID 2664 wrote to memory of 2960 2664 net.exe 40 PID 2664 wrote to memory of 2960 2664 net.exe 40 PID 2664 wrote to memory of 2960 2664 net.exe 40 PID 2600 wrote to memory of 1192 2600 Logo1_.exe 21 PID 2600 wrote to memory of 1192 2600 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\5c77dc74765c0500f1023136ee097d938ef4da166a4874db26040e69dfeac992.exe"C:\Users\Admin\AppData\Local\Temp\5c77dc74765c0500f1023136ee097d938ef4da166a4874db26040e69dfeac992.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2820
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a2607.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\5c77dc74765c0500f1023136ee097d938ef4da166a4874db26040e69dfeac992.exe"C:\Users\Admin\AppData\Local\Temp\5c77dc74765c0500f1023136ee097d938ef4da166a4874db26040e69dfeac992.exe"4⤵
- Executes dropped EXE
PID:2588
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2620
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2960
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5060347047d63427782c0376930785ff5
SHA1d78f3c47a404c115d0d79a175447a47871fd605e
SHA2565c5ac3fa6013be6c0602a7a6f8b24acb738e37366c43b67989091b9725adf51f
SHA5129811f2721f76f6d874ac390c516a7a3d5037a82c785d0c35540353b0827ac2fe24d7f1e8be8e6ae7278b00be9aa30f4d5385076e82576b38d1c36df6b09693d2
-
Filesize
722B
MD5af0b6fb84b8854f29764e472de80061b
SHA14b6d13840fec22e3a599749ce76b096bef2f48a7
SHA256e06e0835ce5d441553fc82ee8a7b4165606428c151d4b8c50a8f782a1cc271ab
SHA512e6654c485f2f4e798693368e33213222aa31470f4d83cce8f164059cdac30e0a9e79542788e6c7ec58764e22491b0d1a067358e994eb97ebaa2b4c3ad9a7a287
-
C:\Users\Admin\AppData\Local\Temp\5c77dc74765c0500f1023136ee097d938ef4da166a4874db26040e69dfeac992.exe.exe
Filesize544KB
MD59a1dd1d96481d61934dcc2d568971d06
SHA1f136ef9bf8bd2fc753292fb5b7cf173a22675fb3
SHA2568cebb25e240db3b6986fcaed6bc0b900fa09dad763a56fb71273529266c5c525
SHA5127ac1581f8a29e778ba1a1220670796c47fa5b838417f8f635e2cb1998a01515cff3ee57045dacb78a8ec70d43754b970743aba600379fe6d9481958d32d8a5aa
-
Filesize
39KB
MD5f7ebb3d79ef53cfda9bebd3a4b0e4e0a
SHA13670512f285d65e981e9d7592844c7c42e5d4773
SHA2563c2d6a686dd3a04d7e3413afbe50663a259d1fefa0bb8dfa9568d4c87bf99ef5
SHA512177035a8504c5f1456659715d33968e85b291e44aa89232e96c4c52a2b2156c80f6f5639802241a46d0849f8230c9212d7fc6977b96d5c09440217ba3bad2adb
-
Filesize
9B
MD57619ead719f9163af9f64f79eeff7c36
SHA17b956c82fba1f4a0ea8b09ca2e39d89159e21b75
SHA256da9af76d7e3938d1bd300436de0d394ef0453f260a69c94905084222eb3fbb45
SHA51229dd3ef54766931036c2f0d755bb3fc89619e548c95658577930a5a748ac2b2855a9e5ee5601697ebbac8a7d435abd4c9e9e2255b0e455e267e0d95358fa86df