Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/06/2024, 18:50
Static task
static1
Behavioral task
behavioral1
Sample
e01452fae026a319ca3a858940cfd62242b10b264ae06fc05d50c45f11c0d7db.exe
Resource
win7-20240221-en
General
-
Target
e01452fae026a319ca3a858940cfd62242b10b264ae06fc05d50c45f11c0d7db.exe
-
Size
105KB
-
MD5
9ff813299d25a30883c0697996beaca0
-
SHA1
44ff3dc76d72b4eabac961492308b0befd89f878
-
SHA256
e01452fae026a319ca3a858940cfd62242b10b264ae06fc05d50c45f11c0d7db
-
SHA512
e593a2dbf8fa78814634a72e515a0822675bc558c9d7b135906c1b0fdf53b38b9dcfff80434d7b85f98bde1ee42e679a268e8225be6f54bef00a0044d383872c
-
SSDEEP
3072:JjaY46tGNFC0VFu2NQKPWDyDRepJltZrpRSfHe:/46tGfC0jhNSDyDRothpQG
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts e01452fae026a319ca3a858940cfd62242b10b264ae06fc05d50c45f11c0d7db.exe File opened for modification C:\Windows\system32\drivers\etc\hosts Logo1_.exe -
Deletes itself 1 IoCs
pid Process 2776 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2652 Logo1_.exe 2948 e01452fae026a319ca3a858940cfd62242b10b264ae06fc05d50c45f11c0d7db.exe -
Loads dropped DLL 2 IoCs
pid Process 2776 cmd.exe 2776 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\7-Zip\Lang\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\unpack200.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\dropins\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\TableTextService\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\eu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ECLIPSE\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\zu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_filter\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ckb\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mr\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\or\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\te\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BOLDSTRI\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\serialver.exe Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\STUDIO\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Antarctica\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\dtplugin\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\America\Argentina\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\MpCmdRun.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\af\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gu\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Defender\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\ARFR\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\icons\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Triedit\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fi\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VBA\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\orbd.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\control\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe e01452fae026a319ca3a858940cfd62242b10b264ae06fc05d50c45f11c0d7db.exe File created C:\Windows\Logo1_.exe e01452fae026a319ca3a858940cfd62242b10b264ae06fc05d50c45f11c0d7db.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 1412 e01452fae026a319ca3a858940cfd62242b10b264ae06fc05d50c45f11c0d7db.exe 1412 e01452fae026a319ca3a858940cfd62242b10b264ae06fc05d50c45f11c0d7db.exe 1412 e01452fae026a319ca3a858940cfd62242b10b264ae06fc05d50c45f11c0d7db.exe 1412 e01452fae026a319ca3a858940cfd62242b10b264ae06fc05d50c45f11c0d7db.exe 1412 e01452fae026a319ca3a858940cfd62242b10b264ae06fc05d50c45f11c0d7db.exe 1412 e01452fae026a319ca3a858940cfd62242b10b264ae06fc05d50c45f11c0d7db.exe 1412 e01452fae026a319ca3a858940cfd62242b10b264ae06fc05d50c45f11c0d7db.exe 1412 e01452fae026a319ca3a858940cfd62242b10b264ae06fc05d50c45f11c0d7db.exe 1412 e01452fae026a319ca3a858940cfd62242b10b264ae06fc05d50c45f11c0d7db.exe 1412 e01452fae026a319ca3a858940cfd62242b10b264ae06fc05d50c45f11c0d7db.exe 1412 e01452fae026a319ca3a858940cfd62242b10b264ae06fc05d50c45f11c0d7db.exe 1412 e01452fae026a319ca3a858940cfd62242b10b264ae06fc05d50c45f11c0d7db.exe 1412 e01452fae026a319ca3a858940cfd62242b10b264ae06fc05d50c45f11c0d7db.exe 2652 Logo1_.exe 2652 Logo1_.exe 2652 Logo1_.exe 2652 Logo1_.exe 2652 Logo1_.exe 2652 Logo1_.exe 2652 Logo1_.exe 2652 Logo1_.exe 2652 Logo1_.exe 2652 Logo1_.exe 2652 Logo1_.exe 2652 Logo1_.exe 2652 Logo1_.exe 2652 Logo1_.exe 2652 Logo1_.exe 2652 Logo1_.exe 2652 Logo1_.exe 2652 Logo1_.exe 2652 Logo1_.exe 2652 Logo1_.exe 2652 Logo1_.exe 2652 Logo1_.exe 2652 Logo1_.exe 2652 Logo1_.exe 2652 Logo1_.exe 2652 Logo1_.exe 2652 Logo1_.exe 2652 Logo1_.exe 2652 Logo1_.exe 2652 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1412 wrote to memory of 848 1412 e01452fae026a319ca3a858940cfd62242b10b264ae06fc05d50c45f11c0d7db.exe 28 PID 1412 wrote to memory of 848 1412 e01452fae026a319ca3a858940cfd62242b10b264ae06fc05d50c45f11c0d7db.exe 28 PID 1412 wrote to memory of 848 1412 e01452fae026a319ca3a858940cfd62242b10b264ae06fc05d50c45f11c0d7db.exe 28 PID 1412 wrote to memory of 848 1412 e01452fae026a319ca3a858940cfd62242b10b264ae06fc05d50c45f11c0d7db.exe 28 PID 848 wrote to memory of 2304 848 net.exe 30 PID 848 wrote to memory of 2304 848 net.exe 30 PID 848 wrote to memory of 2304 848 net.exe 30 PID 848 wrote to memory of 2304 848 net.exe 30 PID 1412 wrote to memory of 2776 1412 e01452fae026a319ca3a858940cfd62242b10b264ae06fc05d50c45f11c0d7db.exe 31 PID 1412 wrote to memory of 2776 1412 e01452fae026a319ca3a858940cfd62242b10b264ae06fc05d50c45f11c0d7db.exe 31 PID 1412 wrote to memory of 2776 1412 e01452fae026a319ca3a858940cfd62242b10b264ae06fc05d50c45f11c0d7db.exe 31 PID 1412 wrote to memory of 2776 1412 e01452fae026a319ca3a858940cfd62242b10b264ae06fc05d50c45f11c0d7db.exe 31 PID 1412 wrote to memory of 2652 1412 e01452fae026a319ca3a858940cfd62242b10b264ae06fc05d50c45f11c0d7db.exe 33 PID 1412 wrote to memory of 2652 1412 e01452fae026a319ca3a858940cfd62242b10b264ae06fc05d50c45f11c0d7db.exe 33 PID 1412 wrote to memory of 2652 1412 e01452fae026a319ca3a858940cfd62242b10b264ae06fc05d50c45f11c0d7db.exe 33 PID 1412 wrote to memory of 2652 1412 e01452fae026a319ca3a858940cfd62242b10b264ae06fc05d50c45f11c0d7db.exe 33 PID 2776 wrote to memory of 2948 2776 cmd.exe 34 PID 2776 wrote to memory of 2948 2776 cmd.exe 34 PID 2776 wrote to memory of 2948 2776 cmd.exe 34 PID 2776 wrote to memory of 2948 2776 cmd.exe 34 PID 2652 wrote to memory of 2920 2652 Logo1_.exe 35 PID 2652 wrote to memory of 2920 2652 Logo1_.exe 35 PID 2652 wrote to memory of 2920 2652 Logo1_.exe 35 PID 2652 wrote to memory of 2920 2652 Logo1_.exe 35 PID 2920 wrote to memory of 2936 2920 net.exe 37 PID 2920 wrote to memory of 2936 2920 net.exe 37 PID 2920 wrote to memory of 2936 2920 net.exe 37 PID 2920 wrote to memory of 2936 2920 net.exe 37 PID 2652 wrote to memory of 2096 2652 Logo1_.exe 38 PID 2652 wrote to memory of 2096 2652 Logo1_.exe 38 PID 2652 wrote to memory of 2096 2652 Logo1_.exe 38 PID 2652 wrote to memory of 2096 2652 Logo1_.exe 38 PID 2096 wrote to memory of 2600 2096 net.exe 40 PID 2096 wrote to memory of 2600 2096 net.exe 40 PID 2096 wrote to memory of 2600 2096 net.exe 40 PID 2096 wrote to memory of 2600 2096 net.exe 40 PID 2652 wrote to memory of 1200 2652 Logo1_.exe 21 PID 2652 wrote to memory of 1200 2652 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\e01452fae026a319ca3a858940cfd62242b10b264ae06fc05d50c45f11c0d7db.exe"C:\Users\Admin\AppData\Local\Temp\e01452fae026a319ca3a858940cfd62242b10b264ae06fc05d50c45f11c0d7db.exe"2⤵
- Drops file in Drivers directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2304
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aAC56.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\e01452fae026a319ca3a858940cfd62242b10b264ae06fc05d50c45f11c0d7db.exe"C:\Users\Admin\AppData\Local\Temp\e01452fae026a319ca3a858940cfd62242b10b264ae06fc05d50c45f11c0d7db.exe"4⤵
- Executes dropped EXE
PID:2948
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2936
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2600
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258KB
MD5abebaf128d6bdb9fde2b1f0e33f1940d
SHA1173fb9534043dca8d7b00cd16e140bea31e380c4
SHA256e8db4f222623580956eaa3cecb1aff5bcd019e9a004c3fe05f0feb696580c44e
SHA5126d73721e41950c1d3473bfe154ce33ed2b52034ec9c56608e84f00323db7860930dfba52613a5a8f02644a112891e3d8e615c705647719b70316ea8dd226be92
-
Filesize
478KB
MD577ec999dc753d70d4a8fbc32a98efb2f
SHA1172ba524961356c8cf218baf27e14c66a07ffefc
SHA2567178ea26cd9a2cd05e48e5d856a330d3e276d798d14aa10852df737f141dfbc5
SHA51267d6a5f5034c44c4dbd5df9f61dc7754a1981040f04e2bd8159b8311f9b57009d731ac051a7751ff4674817f3d6f2c3fb5537046a289f45ca038d10084b6bd58
-
Filesize
722B
MD5b5d9b11f1d6e62847b030e79a1fa9d04
SHA1adb482fb0d064078fc7d5bd0bf455ecdd42a6456
SHA25670d0f7416251aa6e3cac47b6656836659cad547935f2aed27c10012d8b0ba65c
SHA512de6eeda293c16e2fc54380eaae697b408fe624756c42ff001c6614c35179bc6d6068c103d65a10da0fc4fb70df3e5b780e1d1ef5050db6440abfc71f154d147d
-
C:\Users\Admin\AppData\Local\Temp\e01452fae026a319ca3a858940cfd62242b10b264ae06fc05d50c45f11c0d7db.exe.exe
Filesize71KB
MD5423adb5b09778f505593929d89d3fd8c
SHA1ba688ed370a2dbba0589fc7bcebf726111910189
SHA25699cec7888af203c8997fc4e9a3b2a5b974540fe0e70f161c1b6b025309f12607
SHA512406452e7891f8b4307465ee83edb925c76a1649bb405878cfb1d8e971c470569163f1493922b25a44f71b788f0ff1971485eafe47d982752d3974426032edd51
-
Filesize
33KB
MD555b45e3d9494b95a16c60dfc44599db6
SHA166ec47cfced6ff77e8a5bba352f48ad6f7e78d7b
SHA2563e4b59e3d964fb8e6f36415ef5acbb9d24638945c0ee0ed4624e34e3fd766449
SHA512416fa491918b8e071b0d6d4bfe6c83de520a6543720f9fc072e22c0ffe4a1c82ece856f4961e111b04365ff3e70ae834e9b39b0a9825686b78b5102a1c70933f
-
Filesize
832B
MD57e3a0edd0c6cd8316f4b6c159d5167a1
SHA1753428b4736ffb2c9e3eb50f89255b212768c55a
SHA2561965854dfa54c72529c88c7d9f41fa31b4140cad04cf03d3f0f2e7601fcbdc6c
SHA5129c68f7f72dfa109fcfba6472a1cced85bc6c2a5481232c6d1d039c88b2f65fb86070aeb26ac23e420c6255daca02ea6e698892f7670298d2c4f741b9e9415c7f
-
Filesize
8B
MD59bf5ad0e8bbf0ba1630c244358e5c6dd
SHA125918532222a7063195beeb76980b6ec9e59e19a
SHA256551cc5b618f0fa78108dd2388d9136893adb10499e4836e9728f4e96530bf02f
SHA5127fdce76bb191d4988d92e3d97ce8db4cae1b5c1f93198bffc4e863d324d814246353200d32ea730f83345fcb7ad82213c2bcd31351e905e473d9596bc7b43ad3