Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
02/06/2024, 13:31
Static task
static1
Behavioral task
behavioral1
Sample
23b62dada4f5e1e602a4e0f9208c60463208610e4d81062e8b972a2a44b64f64.exe
Resource
win7-20240215-en
General
-
Target
23b62dada4f5e1e602a4e0f9208c60463208610e4d81062e8b972a2a44b64f64.exe
-
Size
583KB
-
MD5
60556e4b20fce0b271b4217af2a803a6
-
SHA1
9de0c826bc1a91bf30c6828ce8fbea2f229018b5
-
SHA256
23b62dada4f5e1e602a4e0f9208c60463208610e4d81062e8b972a2a44b64f64
-
SHA512
788f8db0638f7f9b9ed22f74b3ca0086319c640cb71bdce2f3e366ded96587cb318e4ccb27167299ba8e531f62215c73faed9caff6eed8b0d556817de92f355c
-
SSDEEP
6144:k/KW+aezDE7cV3iwbAFRWAbd4nf0H05yqE6Hl0ChW0+ksllAXBu0lWGWUJJQ4t0G:HW+aB7a3iwbihym2g7XO3LWUQfh4Co
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2692 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2828 Logo1_.exe 2792 23b62dada4f5e1e602a4e0f9208c60463208610e4d81062e8b972a2a44b64f64.exe -
Loads dropped DLL 1 IoCs
pid Process 2692 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\VideoLAN\VLC\locale\af\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\be\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mai\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Chess\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\FreeCell.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\SmartTagInstall.exe Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BREEZE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SPRING\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\html\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\an\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\1040\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Triedit\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\bg\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\EDGE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\be\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lt\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\services_discovery\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\servertool.exe Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\LogTransport2.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RADIAL\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\Accessories\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\it\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\SystemV\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jinfo.exe Logo1_.exe File opened for modification C:\Program Files\Windows Mail\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\orbd.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\rmid.exe Logo1_.exe File created C:\Program Files (x86)\Adobe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ks_IN\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sq\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\FLTLDR.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\unpack200.exe Logo1_.exe File opened for modification C:\Program Files\Uninstall Information\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\js\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Dll.dll Logo1_.exe File created C:\Windows\rundl132.exe 23b62dada4f5e1e602a4e0f9208c60463208610e4d81062e8b972a2a44b64f64.exe File created C:\Windows\Logo1_.exe 23b62dada4f5e1e602a4e0f9208c60463208610e4d81062e8b972a2a44b64f64.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 2484 23b62dada4f5e1e602a4e0f9208c60463208610e4d81062e8b972a2a44b64f64.exe 2484 23b62dada4f5e1e602a4e0f9208c60463208610e4d81062e8b972a2a44b64f64.exe 2484 23b62dada4f5e1e602a4e0f9208c60463208610e4d81062e8b972a2a44b64f64.exe 2484 23b62dada4f5e1e602a4e0f9208c60463208610e4d81062e8b972a2a44b64f64.exe 2484 23b62dada4f5e1e602a4e0f9208c60463208610e4d81062e8b972a2a44b64f64.exe 2484 23b62dada4f5e1e602a4e0f9208c60463208610e4d81062e8b972a2a44b64f64.exe 2484 23b62dada4f5e1e602a4e0f9208c60463208610e4d81062e8b972a2a44b64f64.exe 2484 23b62dada4f5e1e602a4e0f9208c60463208610e4d81062e8b972a2a44b64f64.exe 2484 23b62dada4f5e1e602a4e0f9208c60463208610e4d81062e8b972a2a44b64f64.exe 2484 23b62dada4f5e1e602a4e0f9208c60463208610e4d81062e8b972a2a44b64f64.exe 2484 23b62dada4f5e1e602a4e0f9208c60463208610e4d81062e8b972a2a44b64f64.exe 2484 23b62dada4f5e1e602a4e0f9208c60463208610e4d81062e8b972a2a44b64f64.exe 2484 23b62dada4f5e1e602a4e0f9208c60463208610e4d81062e8b972a2a44b64f64.exe 2828 Logo1_.exe 2828 Logo1_.exe 2828 Logo1_.exe 2828 Logo1_.exe 2828 Logo1_.exe 2828 Logo1_.exe 2828 Logo1_.exe 2828 Logo1_.exe 2828 Logo1_.exe 2828 Logo1_.exe 2828 Logo1_.exe 2828 Logo1_.exe 2828 Logo1_.exe 2828 Logo1_.exe 2828 Logo1_.exe 2828 Logo1_.exe 2828 Logo1_.exe 2828 Logo1_.exe 2828 Logo1_.exe 2828 Logo1_.exe 2828 Logo1_.exe 2828 Logo1_.exe 2828 Logo1_.exe 2828 Logo1_.exe 2828 Logo1_.exe 2828 Logo1_.exe 2828 Logo1_.exe 2828 Logo1_.exe 2828 Logo1_.exe 2828 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2484 wrote to memory of 2124 2484 23b62dada4f5e1e602a4e0f9208c60463208610e4d81062e8b972a2a44b64f64.exe 28 PID 2484 wrote to memory of 2124 2484 23b62dada4f5e1e602a4e0f9208c60463208610e4d81062e8b972a2a44b64f64.exe 28 PID 2484 wrote to memory of 2124 2484 23b62dada4f5e1e602a4e0f9208c60463208610e4d81062e8b972a2a44b64f64.exe 28 PID 2484 wrote to memory of 2124 2484 23b62dada4f5e1e602a4e0f9208c60463208610e4d81062e8b972a2a44b64f64.exe 28 PID 2124 wrote to memory of 1932 2124 net.exe 30 PID 2124 wrote to memory of 1932 2124 net.exe 30 PID 2124 wrote to memory of 1932 2124 net.exe 30 PID 2124 wrote to memory of 1932 2124 net.exe 30 PID 2484 wrote to memory of 2692 2484 23b62dada4f5e1e602a4e0f9208c60463208610e4d81062e8b972a2a44b64f64.exe 31 PID 2484 wrote to memory of 2692 2484 23b62dada4f5e1e602a4e0f9208c60463208610e4d81062e8b972a2a44b64f64.exe 31 PID 2484 wrote to memory of 2692 2484 23b62dada4f5e1e602a4e0f9208c60463208610e4d81062e8b972a2a44b64f64.exe 31 PID 2484 wrote to memory of 2692 2484 23b62dada4f5e1e602a4e0f9208c60463208610e4d81062e8b972a2a44b64f64.exe 31 PID 2484 wrote to memory of 2828 2484 23b62dada4f5e1e602a4e0f9208c60463208610e4d81062e8b972a2a44b64f64.exe 33 PID 2484 wrote to memory of 2828 2484 23b62dada4f5e1e602a4e0f9208c60463208610e4d81062e8b972a2a44b64f64.exe 33 PID 2484 wrote to memory of 2828 2484 23b62dada4f5e1e602a4e0f9208c60463208610e4d81062e8b972a2a44b64f64.exe 33 PID 2484 wrote to memory of 2828 2484 23b62dada4f5e1e602a4e0f9208c60463208610e4d81062e8b972a2a44b64f64.exe 33 PID 2828 wrote to memory of 2564 2828 Logo1_.exe 34 PID 2828 wrote to memory of 2564 2828 Logo1_.exe 34 PID 2828 wrote to memory of 2564 2828 Logo1_.exe 34 PID 2828 wrote to memory of 2564 2828 Logo1_.exe 34 PID 2564 wrote to memory of 2592 2564 net.exe 36 PID 2564 wrote to memory of 2592 2564 net.exe 36 PID 2564 wrote to memory of 2592 2564 net.exe 36 PID 2564 wrote to memory of 2592 2564 net.exe 36 PID 2692 wrote to memory of 2792 2692 cmd.exe 37 PID 2692 wrote to memory of 2792 2692 cmd.exe 37 PID 2692 wrote to memory of 2792 2692 cmd.exe 37 PID 2692 wrote to memory of 2792 2692 cmd.exe 37 PID 2828 wrote to memory of 2712 2828 Logo1_.exe 38 PID 2828 wrote to memory of 2712 2828 Logo1_.exe 38 PID 2828 wrote to memory of 2712 2828 Logo1_.exe 38 PID 2828 wrote to memory of 2712 2828 Logo1_.exe 38 PID 2712 wrote to memory of 2576 2712 net.exe 40 PID 2712 wrote to memory of 2576 2712 net.exe 40 PID 2712 wrote to memory of 2576 2712 net.exe 40 PID 2712 wrote to memory of 2576 2712 net.exe 40 PID 2828 wrote to memory of 1132 2828 Logo1_.exe 20 PID 2828 wrote to memory of 1132 2828 Logo1_.exe 20
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1132
-
C:\Users\Admin\AppData\Local\Temp\23b62dada4f5e1e602a4e0f9208c60463208610e4d81062e8b972a2a44b64f64.exe"C:\Users\Admin\AppData\Local\Temp\23b62dada4f5e1e602a4e0f9208c60463208610e4d81062e8b972a2a44b64f64.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:1932
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a1DDD.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\23b62dada4f5e1e602a4e0f9208c60463208610e4d81062e8b972a2a44b64f64.exe"C:\Users\Admin\AppData\Local\Temp\23b62dada4f5e1e602a4e0f9208c60463208610e4d81062e8b972a2a44b64f64.exe"4⤵
- Executes dropped EXE
PID:2792
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2592
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2576
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD59dedb1a7eef99feed2af3fb8c73297b0
SHA1fa03da28428dcfb50fce06b34745dbd9f1c31143
SHA2561def99dc66bb41bb916f73bb75499d0a72900e77c0a62c85c475526384b89cd4
SHA512b1994704303dc932cf601bf0bb4ffca7e49f317dc1f9194c79262aadb1ecc35ff9ce40518f4064a97d7893c0418216cc4ede0b4bf6c40e6891f12d5bf49d01d3
-
Filesize
484KB
MD5edc9d968c214a944e019fad26d1a18a5
SHA128dacfbfe9840c27f5af05343af82338786b1f36
SHA256b0f8dc8ea8e999b6c25e460e2f644f2ed41b2e481f57f5800de9c0c93c9ef275
SHA512f381ea38921a0163ced1feb11a9748010b2bf76f8eaf66ae326e98eb5d5ff75bc4b4342b4d3acf27a5177393c5b05cf43bb007ceb1d7799498e8429c8efb86a7
-
Filesize
722B
MD537dfeb681c26dbfdb900e869eba8b4bb
SHA12373cb218005402172c33312f7c2354b478eff0d
SHA25617d905b8b78000906b26479215f4820b520efe18d49f3a724277935625f61cc7
SHA51248717299f220b28be859dd0d2913052501a7e7021d3cdd06d7fc4a342c00ae81eea0ad5557af9005e166c1b83b2eaa12fb17edbb46139e7cb4be40fbac5356c5
-
C:\Users\Admin\AppData\Local\Temp\23b62dada4f5e1e602a4e0f9208c60463208610e4d81062e8b972a2a44b64f64.exe.exe
Filesize544KB
MD59a1dd1d96481d61934dcc2d568971d06
SHA1f136ef9bf8bd2fc753292fb5b7cf173a22675fb3
SHA2568cebb25e240db3b6986fcaed6bc0b900fa09dad763a56fb71273529266c5c525
SHA5127ac1581f8a29e778ba1a1220670796c47fa5b838417f8f635e2cb1998a01515cff3ee57045dacb78a8ec70d43754b970743aba600379fe6d9481958d32d8a5aa
-
Filesize
39KB
MD5a526b8c1dae7728e93d5ba5eeae7b353
SHA1bb0c23e0b0a3cfa0ae52854c14e0adce7c439a33
SHA25657253ef09f37588bafc2dd017b0ad6f27f5d6a6b526d5ca90bae19f25fcfe616
SHA5124577203ad19ef23357f96091f8d621db5fb42ad4f6f2fdce68f3ec51fea248fbc38deb5d13865097d2c7cbca1db8ae9f18a42b6aac1fedc81a479d2ebbf20926
-
Filesize
8B
MD5af485d3db9f82d3e5bdc8c6d87fb742e
SHA1f879c3dbd3d34e9789ff73896508bfbeabbf7468
SHA2567a7b688ede50bbaf08d4579fbd8c6b6c99d9dd1206d95ab24d8174eb9be98759
SHA512d5fe5155948320ef6d3f80c01c9a81f0d4f60bab381d921ab2e06b62475618b973b34346bd41b40af24f2b5aff64bba68710f405f7ff21a58f369acbaaee9360