Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
09/06/2024, 21:29
Static task
static1
Behavioral task
behavioral1
Sample
50c5972d36219683012d6eefed7eb0eab768ae360126c306cb0c6f06a1c6c428.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
50c5972d36219683012d6eefed7eb0eab768ae360126c306cb0c6f06a1c6c428.exe
Resource
win10v2004-20240426-en
General
-
Target
50c5972d36219683012d6eefed7eb0eab768ae360126c306cb0c6f06a1c6c428.exe
-
Size
27KB
-
MD5
cbdbc7d60b720cfc813f161630d878c4
-
SHA1
b75692807260dddf761598401dfa77cdbe4e624f
-
SHA256
50c5972d36219683012d6eefed7eb0eab768ae360126c306cb0c6f06a1c6c428
-
SHA512
50198a6082003d28536e5b2d6c492150a53bcc2d1e05cfeb0a62f23e4ff6673639c4404d5a53f962e68d1a430f62fac1c49623372fcd662494e1c6903ebb2ca1
-
SSDEEP
384:M1V1Gt5M0zhIV/DZ3KZp7JcTO4yf9KFL/KaUUqd3qR+FlYTj9QTN0wpD9p5Cs1:e16GVRu1yK9fMFLKaTxsujCT7pZpYW
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2216 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 820 Logo1_.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\PIXEL\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\control\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\GrayCheck\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\pt_PT\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Journal\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\el\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\es_MX\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Cartridges\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ky\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ta\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BREEZE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ACCICONS.EXE Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\it\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CANYON\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\images\cursors\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\es_MX\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\Accessories\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\pack200.exe Logo1_.exe File opened for modification C:\Program Files\Windows Photo Viewer\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Word.en-us\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CONCRETE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\ProjectTool\Project Report Type\Fancy\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ru\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\applet\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bn_IN\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Triedit\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\PROOF\1036\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp_5.5.0.165303\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Biscay\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft.NET\RedistList\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\images\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Solitaire\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\zh_TW\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\groove.net\Components\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\apt.exe Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\javacpl.exe Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Mahjong\en-US\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 50c5972d36219683012d6eefed7eb0eab768ae360126c306cb0c6f06a1c6c428.exe File created C:\Windows\Logo1_.exe 50c5972d36219683012d6eefed7eb0eab768ae360126c306cb0c6f06a1c6c428.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 820 Logo1_.exe 820 Logo1_.exe 820 Logo1_.exe 820 Logo1_.exe 820 Logo1_.exe 820 Logo1_.exe 820 Logo1_.exe 820 Logo1_.exe 820 Logo1_.exe 820 Logo1_.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2216 2220 50c5972d36219683012d6eefed7eb0eab768ae360126c306cb0c6f06a1c6c428.exe 28 PID 2220 wrote to memory of 2216 2220 50c5972d36219683012d6eefed7eb0eab768ae360126c306cb0c6f06a1c6c428.exe 28 PID 2220 wrote to memory of 2216 2220 50c5972d36219683012d6eefed7eb0eab768ae360126c306cb0c6f06a1c6c428.exe 28 PID 2220 wrote to memory of 2216 2220 50c5972d36219683012d6eefed7eb0eab768ae360126c306cb0c6f06a1c6c428.exe 28 PID 2220 wrote to memory of 820 2220 50c5972d36219683012d6eefed7eb0eab768ae360126c306cb0c6f06a1c6c428.exe 29 PID 2220 wrote to memory of 820 2220 50c5972d36219683012d6eefed7eb0eab768ae360126c306cb0c6f06a1c6c428.exe 29 PID 2220 wrote to memory of 820 2220 50c5972d36219683012d6eefed7eb0eab768ae360126c306cb0c6f06a1c6c428.exe 29 PID 2220 wrote to memory of 820 2220 50c5972d36219683012d6eefed7eb0eab768ae360126c306cb0c6f06a1c6c428.exe 29 PID 820 wrote to memory of 2996 820 Logo1_.exe 31 PID 820 wrote to memory of 2996 820 Logo1_.exe 31 PID 820 wrote to memory of 2996 820 Logo1_.exe 31 PID 820 wrote to memory of 2996 820 Logo1_.exe 31 PID 2996 wrote to memory of 2724 2996 net.exe 33 PID 2996 wrote to memory of 2724 2996 net.exe 33 PID 2996 wrote to memory of 2724 2996 net.exe 33 PID 2996 wrote to memory of 2724 2996 net.exe 33 PID 820 wrote to memory of 1204 820 Logo1_.exe 21 PID 820 wrote to memory of 1204 820 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\50c5972d36219683012d6eefed7eb0eab768ae360126c306cb0c6f06a1c6c428.exe"C:\Users\Admin\AppData\Local\Temp\50c5972d36219683012d6eefed7eb0eab768ae360126c306cb0c6f06a1c6c428.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a1E2B.bat3⤵
- Deletes itself
PID:2216
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2724
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
252KB
MD5748a0e32e05f79b6b28a1449ca994e9c
SHA1ccbadff261eb0b43b1a37475cfe2cc0a6aa4cd44
SHA256bac44cff3f0d81881f3f6c0c52010780db38ac8624137675eaac3ca754f751d8
SHA512ec6cff2f98bf41b975cca26825a3243352e79d55963bc52f0bc6ffc7080ff153582db8e4ba9a77415f6288a699e9069a8d41247629602e5d2307095e6a80fcec
-
Filesize
472KB
MD588eb1bca8c399bc3f46e99cdde2f047e
SHA155fafbceb011e1af2edced978686a90971bd95f2
SHA25642fd78c05bc240d4ded16ac974f17c336f6ae3a1814d548021c48a942cc30428
SHA512149d4de0c024e25a13a7bb17471e6f48391d4f26b1c8388672320eed1c255f84219ad7b72bbebc531ae558d5192dd4bb6d0dddd6c65a45300c8e8348a4fb3728
-
Filesize
722B
MD56adcb625287e9e777833baf121a9061c
SHA190b594308342f26701374ca526d323e752f979e6
SHA2563ccd237d5cab81c0d023aa6ed5fe943bef2439bec8233fa0c13c7bd5ee700122
SHA512a97706d8c1bd2cd2da492fb0fce3bb5176255f021472e8cba8fc9137ccdb07b678a1d1317ead62241103d39ce84fcfbfc789b6b06b73da487bd12a042c8eddf5
-
C:\Users\Admin\AppData\Local\Temp\50c5972d36219683012d6eefed7eb0eab768ae360126c306cb0c6f06a1c6c428.exe.exe
Filesize162B
MD5380bbf4d7bdac05d2248b49c4188cd92
SHA1ae83ef83ebe684eab30ab3ca431e4f84994fd60f
SHA256b97278e320af9d3d990703fd1af322e7c4b568a92f6a736149c1648b2f07a7c2
SHA51206fe7a78b558b7581b52f8d65a6a8a62338a429e550c91ad4ba5cc3f445da83ee86b99e5c7dfbd9bbfcc12895215d2a329756dc6b24ef8313f70658abc08db15
-
Filesize
27KB
MD5a5ed9bcfc5b8743127cf35ee9d08642b
SHA11cc3de2dbebc3f89c115210f9cc968695e30f632
SHA2567e5bc389d539856aeb50fcc7096108571807546a82e1967c29458552c2b86e1c
SHA5122d4aba05b35dfc00ae7cd9a64adb3b6990d4d5e0b8e6c7b9843585427236340ecbf5102209fd91bf34fc6c7c68eab5b9679dde923661d73eaeecdc4cd334c54a
-
Filesize
8B
MD59bf5ad0e8bbf0ba1630c244358e5c6dd
SHA125918532222a7063195beeb76980b6ec9e59e19a
SHA256551cc5b618f0fa78108dd2388d9136893adb10499e4836e9728f4e96530bf02f
SHA5127fdce76bb191d4988d92e3d97ce8db4cae1b5c1f93198bffc4e863d324d814246353200d32ea730f83345fcb7ad82213c2bcd31351e905e473d9596bc7b43ad3