Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03/06/2024, 15:29
Static task
static1
Behavioral task
behavioral1
Sample
2f76c167166dfd198bb3356c8a5ef9564f0e398eec5fa1dc0e2033c904022de8.exe
Resource
win7-20240221-en
General
-
Target
2f76c167166dfd198bb3356c8a5ef9564f0e398eec5fa1dc0e2033c904022de8.exe
-
Size
400KB
-
MD5
5b4850d16220e897b6d192d193935bab
-
SHA1
bdd741810ad3e9391dae1f5b5be122b36f2b9cc8
-
SHA256
2f76c167166dfd198bb3356c8a5ef9564f0e398eec5fa1dc0e2033c904022de8
-
SHA512
36c45ea17fd0c328d696ea6afad5c2b75afa4a66f9130cef17704358ff480b0aa0cacdc1b7bed9b907dcaeaeed0391fd4ab34eec68a80f2fff609a7a0b123736
-
SSDEEP
6144:N+aezsP2zPVz7jUBs8hqcBCi6dbfra4erJlt9A+xX1oOAisEIWmGeNkfGuYF1moW:N+aQahVy41
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2564 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2584 Logo1_.exe 2560 2f76c167166dfd198bb3356c8a5ef9564f0e398eec5fa1dc0e2033c904022de8.exe -
Loads dropped DLL 1 IoCs
pid Process 2564 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\cmm\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\cache\binary\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ky\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Photo Viewer\ImagingDevices.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\intf\modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\services_discovery\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\A3DUtility.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Checkers\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\uk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\klist.exe Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\Visualizations\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\defaults\pref\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\cs\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TextConv\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lg\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\si\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RIPPLE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\7-Zip\7z.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\org.eclipse.update\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\.settings\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\kinit.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\zh_CN\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CONCRETE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SATIN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\javaw.exe Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\fonts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ga\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\fr\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Portable Devices\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\az\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BREEZE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Dll.dll Logo1_.exe File created C:\Windows\rundl132.exe 2f76c167166dfd198bb3356c8a5ef9564f0e398eec5fa1dc0e2033c904022de8.exe File created C:\Windows\Logo1_.exe 2f76c167166dfd198bb3356c8a5ef9564f0e398eec5fa1dc0e2033c904022de8.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 2196 2f76c167166dfd198bb3356c8a5ef9564f0e398eec5fa1dc0e2033c904022de8.exe 2196 2f76c167166dfd198bb3356c8a5ef9564f0e398eec5fa1dc0e2033c904022de8.exe 2196 2f76c167166dfd198bb3356c8a5ef9564f0e398eec5fa1dc0e2033c904022de8.exe 2196 2f76c167166dfd198bb3356c8a5ef9564f0e398eec5fa1dc0e2033c904022de8.exe 2196 2f76c167166dfd198bb3356c8a5ef9564f0e398eec5fa1dc0e2033c904022de8.exe 2196 2f76c167166dfd198bb3356c8a5ef9564f0e398eec5fa1dc0e2033c904022de8.exe 2196 2f76c167166dfd198bb3356c8a5ef9564f0e398eec5fa1dc0e2033c904022de8.exe 2196 2f76c167166dfd198bb3356c8a5ef9564f0e398eec5fa1dc0e2033c904022de8.exe 2196 2f76c167166dfd198bb3356c8a5ef9564f0e398eec5fa1dc0e2033c904022de8.exe 2196 2f76c167166dfd198bb3356c8a5ef9564f0e398eec5fa1dc0e2033c904022de8.exe 2196 2f76c167166dfd198bb3356c8a5ef9564f0e398eec5fa1dc0e2033c904022de8.exe 2196 2f76c167166dfd198bb3356c8a5ef9564f0e398eec5fa1dc0e2033c904022de8.exe 2196 2f76c167166dfd198bb3356c8a5ef9564f0e398eec5fa1dc0e2033c904022de8.exe 2584 Logo1_.exe 2584 Logo1_.exe 2584 Logo1_.exe 2584 Logo1_.exe 2584 Logo1_.exe 2584 Logo1_.exe 2584 Logo1_.exe 2584 Logo1_.exe 2584 Logo1_.exe 2584 Logo1_.exe 2584 Logo1_.exe 2584 Logo1_.exe 2584 Logo1_.exe 2584 Logo1_.exe 2584 Logo1_.exe 2584 Logo1_.exe 2584 Logo1_.exe 2584 Logo1_.exe 2584 Logo1_.exe 2584 Logo1_.exe 2584 Logo1_.exe 2584 Logo1_.exe 2584 Logo1_.exe 2584 Logo1_.exe 2584 Logo1_.exe 2584 Logo1_.exe 2584 Logo1_.exe 2584 Logo1_.exe 2584 Logo1_.exe 2584 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2216 2196 2f76c167166dfd198bb3356c8a5ef9564f0e398eec5fa1dc0e2033c904022de8.exe 28 PID 2196 wrote to memory of 2216 2196 2f76c167166dfd198bb3356c8a5ef9564f0e398eec5fa1dc0e2033c904022de8.exe 28 PID 2196 wrote to memory of 2216 2196 2f76c167166dfd198bb3356c8a5ef9564f0e398eec5fa1dc0e2033c904022de8.exe 28 PID 2196 wrote to memory of 2216 2196 2f76c167166dfd198bb3356c8a5ef9564f0e398eec5fa1dc0e2033c904022de8.exe 28 PID 2216 wrote to memory of 1876 2216 net.exe 30 PID 2216 wrote to memory of 1876 2216 net.exe 30 PID 2216 wrote to memory of 1876 2216 net.exe 30 PID 2216 wrote to memory of 1876 2216 net.exe 30 PID 2196 wrote to memory of 2564 2196 2f76c167166dfd198bb3356c8a5ef9564f0e398eec5fa1dc0e2033c904022de8.exe 31 PID 2196 wrote to memory of 2564 2196 2f76c167166dfd198bb3356c8a5ef9564f0e398eec5fa1dc0e2033c904022de8.exe 31 PID 2196 wrote to memory of 2564 2196 2f76c167166dfd198bb3356c8a5ef9564f0e398eec5fa1dc0e2033c904022de8.exe 31 PID 2196 wrote to memory of 2564 2196 2f76c167166dfd198bb3356c8a5ef9564f0e398eec5fa1dc0e2033c904022de8.exe 31 PID 2196 wrote to memory of 2584 2196 2f76c167166dfd198bb3356c8a5ef9564f0e398eec5fa1dc0e2033c904022de8.exe 33 PID 2196 wrote to memory of 2584 2196 2f76c167166dfd198bb3356c8a5ef9564f0e398eec5fa1dc0e2033c904022de8.exe 33 PID 2196 wrote to memory of 2584 2196 2f76c167166dfd198bb3356c8a5ef9564f0e398eec5fa1dc0e2033c904022de8.exe 33 PID 2196 wrote to memory of 2584 2196 2f76c167166dfd198bb3356c8a5ef9564f0e398eec5fa1dc0e2033c904022de8.exe 33 PID 2584 wrote to memory of 2936 2584 Logo1_.exe 34 PID 2584 wrote to memory of 2936 2584 Logo1_.exe 34 PID 2584 wrote to memory of 2936 2584 Logo1_.exe 34 PID 2584 wrote to memory of 2936 2584 Logo1_.exe 34 PID 2936 wrote to memory of 2620 2936 net.exe 36 PID 2936 wrote to memory of 2620 2936 net.exe 36 PID 2936 wrote to memory of 2620 2936 net.exe 36 PID 2936 wrote to memory of 2620 2936 net.exe 36 PID 2564 wrote to memory of 2560 2564 cmd.exe 37 PID 2564 wrote to memory of 2560 2564 cmd.exe 37 PID 2564 wrote to memory of 2560 2564 cmd.exe 37 PID 2564 wrote to memory of 2560 2564 cmd.exe 37 PID 2584 wrote to memory of 2404 2584 Logo1_.exe 38 PID 2584 wrote to memory of 2404 2584 Logo1_.exe 38 PID 2584 wrote to memory of 2404 2584 Logo1_.exe 38 PID 2584 wrote to memory of 2404 2584 Logo1_.exe 38 PID 2404 wrote to memory of 2420 2404 net.exe 40 PID 2404 wrote to memory of 2420 2404 net.exe 40 PID 2404 wrote to memory of 2420 2404 net.exe 40 PID 2404 wrote to memory of 2420 2404 net.exe 40 PID 2584 wrote to memory of 1364 2584 Logo1_.exe 21 PID 2584 wrote to memory of 1364 2584 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1364
-
C:\Users\Admin\AppData\Local\Temp\2f76c167166dfd198bb3356c8a5ef9564f0e398eec5fa1dc0e2033c904022de8.exe"C:\Users\Admin\AppData\Local\Temp\2f76c167166dfd198bb3356c8a5ef9564f0e398eec5fa1dc0e2033c904022de8.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:1876
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a8749.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\2f76c167166dfd198bb3356c8a5ef9564f0e398eec5fa1dc0e2033c904022de8.exe"C:\Users\Admin\AppData\Local\Temp\2f76c167166dfd198bb3356c8a5ef9564f0e398eec5fa1dc0e2033c904022de8.exe"4⤵
- Executes dropped EXE
PID:2560
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2620
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2420
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5c0ad9453492036edf7c366cdfd9970e4
SHA1b43b223cad6f8c349b5138a0d2ccc439d435b303
SHA2569da3db4094a033f920f9aad3266e823e9d592ad78acac24dd0e358ebb059ec3b
SHA512776b87da0cab39e6ee8daade00f9ce91a6d46bfc097aec78c46460ba0e8644ae71b43d1b458167966bdee97312b6d3ab4be71b55da4f9a5181e9bd1255483b26
-
Filesize
484KB
MD57b714d463f7db900d5b6e757778a8ab8
SHA12cfc0e9f54236af8e10b0bfa551d87a20982b733
SHA256c995370836939a29853611830ca08d437286d4f45603edce88f36aa1f99a0d97
SHA512e8fe8823b5b7f282c24c964cbf4f248b7562259a13410bf95997288727f9bfc6ea51c4aa40182b649a2235bafc02062e0c57f4f62876b5174395071a8d68f9bb
-
Filesize
722B
MD5fd2809b6e306c63859de74d821743f8b
SHA140a972c21d12dedf3d1393ee890cbaedc1b98a78
SHA256fb64790f861605f1e47209bd4b8d89dc7b8676f8c2ba47e3035abec621aeb80c
SHA51250aafcd0236f4527d1a34165542e68831fd4536df197b949f62cc33c62f92bc51a3450a8006df7ac5ad58576be5375870aaf9585e8ec03e429aba67bbcc18c05
-
C:\Users\Admin\AppData\Local\Temp\2f76c167166dfd198bb3356c8a5ef9564f0e398eec5fa1dc0e2033c904022de8.exe.exe
Filesize360KB
MD55fbd45261a2de3bb42f489e825a9a935
SHA1ff388f6e9efe651ec62c4152c1739783e7899293
SHA2569e63701598199d5c47217e23b44d0e3ec5d53f5419166b1b6c68a7e9e8fc47a4
SHA5127f22b1995a07016adb342c551454d602bfbe511525139aee8581b62116608e9e278fd81c26382f1333c7eccded4474196e73c093bb5cbf8e8f203e865024c058
-
Filesize
39KB
MD5e6c7bf55188d71231750f9b606026ff0
SHA1ec05472357b89ab9905ba7f079c275d4a6b86edf
SHA25628612d2c64ed84d1ec223c74aac02dffb75840364574930c5bbc4eea629be22b
SHA512d812d93c3fe8417bf98a1685b31e6c146471e0c4a37b9340ba0a57763852221be002375e109efff0bb01192c3f8180e6bda68d6f6ed927b45cb02f2b1998baa6
-
Filesize
8B
MD5a6f28952c332969f9e6d9f7d1a449737
SHA131c0826adb63cc03162fb9e88781f4b50da8f11b
SHA256d9d875805581110dafdfb2ceb34c5e60f50fe720963f9813c287e4845248d208
SHA5128187572ee8fbb9a42af34a3444be3a4309c5a798e7b1f27fce5b28b7168b72d015b1c10e611ccd3a9361af2aaeab831d2734017f77adff341c3fdb876c296eac