Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
10/06/2024, 14:36
Static task
static1
Behavioral task
behavioral1
Sample
9b7135c8b57fbff60c86a22f79b74d64d869ca56015cd1fa3c386fafb2d0dde1.exe
Resource
win7-20240508-en
General
-
Target
9b7135c8b57fbff60c86a22f79b74d64d869ca56015cd1fa3c386fafb2d0dde1.exe
-
Size
72KB
-
MD5
aedc962c31238cc14f60846f72d673d7
-
SHA1
6f994753a71f48fb3bf8014c981a30a2ee06eddf
-
SHA256
9b7135c8b57fbff60c86a22f79b74d64d869ca56015cd1fa3c386fafb2d0dde1
-
SHA512
e4b9d36dae05da7ae533b9df9e83c05629a2cfae1fb33a1600c32fc7ec859a5f12ab19b7c4d96643c1701adf7a512dab644eef977378e2f5c7be54d5706e9f50
-
SSDEEP
1536:Hje+Zk7qzUJBeLkbiT29dXXC4ayFGyHNXk:Hje+aezUDbHXHC+4yHN0
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3040 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2848 Logo1_.exe 2900 9b7135c8b57fbff60c86a22f79b74d64d869ca56015cd1fa3c386fafb2d0dde1.exe -
Loads dropped DLL 1 IoCs
pid Process 3040 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Mozilla Firefox\defaults\pref\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fy\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\core\locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Chess\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\A3DUtility.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\dropins\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\plugin2\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Purble Place\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tt\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ne\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\1041\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\kinit.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.core_5.5.0.165303\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\update_tracking\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Update\Install\{7ADE9966-696F-4996-9E1A-1D7786573DA1}\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Mail\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hi\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Oarpmany.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ast\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\IRIS\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\Accessories\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\Offline\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Mail\wab.exe Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\_desktop.ini Logo1_.exe File created C:\Program Files\MSBuild\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\am_ET\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\MSASCui.exe Logo1_.exe File created C:\Program Files\Windows Media Player\Network Sharing\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\More Games\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VBA\VBA7\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe File created C:\Windows\rundl132.exe 9b7135c8b57fbff60c86a22f79b74d64d869ca56015cd1fa3c386fafb2d0dde1.exe File created C:\Windows\Logo1_.exe 9b7135c8b57fbff60c86a22f79b74d64d869ca56015cd1fa3c386fafb2d0dde1.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 3068 9b7135c8b57fbff60c86a22f79b74d64d869ca56015cd1fa3c386fafb2d0dde1.exe 3068 9b7135c8b57fbff60c86a22f79b74d64d869ca56015cd1fa3c386fafb2d0dde1.exe 3068 9b7135c8b57fbff60c86a22f79b74d64d869ca56015cd1fa3c386fafb2d0dde1.exe 3068 9b7135c8b57fbff60c86a22f79b74d64d869ca56015cd1fa3c386fafb2d0dde1.exe 3068 9b7135c8b57fbff60c86a22f79b74d64d869ca56015cd1fa3c386fafb2d0dde1.exe 3068 9b7135c8b57fbff60c86a22f79b74d64d869ca56015cd1fa3c386fafb2d0dde1.exe 3068 9b7135c8b57fbff60c86a22f79b74d64d869ca56015cd1fa3c386fafb2d0dde1.exe 3068 9b7135c8b57fbff60c86a22f79b74d64d869ca56015cd1fa3c386fafb2d0dde1.exe 3068 9b7135c8b57fbff60c86a22f79b74d64d869ca56015cd1fa3c386fafb2d0dde1.exe 3068 9b7135c8b57fbff60c86a22f79b74d64d869ca56015cd1fa3c386fafb2d0dde1.exe 3068 9b7135c8b57fbff60c86a22f79b74d64d869ca56015cd1fa3c386fafb2d0dde1.exe 3068 9b7135c8b57fbff60c86a22f79b74d64d869ca56015cd1fa3c386fafb2d0dde1.exe 3068 9b7135c8b57fbff60c86a22f79b74d64d869ca56015cd1fa3c386fafb2d0dde1.exe 2848 Logo1_.exe 2848 Logo1_.exe 2848 Logo1_.exe 2848 Logo1_.exe 2848 Logo1_.exe 2848 Logo1_.exe 2848 Logo1_.exe 2848 Logo1_.exe 2848 Logo1_.exe 2848 Logo1_.exe 2848 Logo1_.exe 2848 Logo1_.exe 2848 Logo1_.exe 2848 Logo1_.exe 2848 Logo1_.exe 2848 Logo1_.exe 2848 Logo1_.exe 2848 Logo1_.exe 2848 Logo1_.exe 2848 Logo1_.exe 2848 Logo1_.exe 2848 Logo1_.exe 2848 Logo1_.exe 2848 Logo1_.exe 2848 Logo1_.exe 2848 Logo1_.exe 2848 Logo1_.exe 2848 Logo1_.exe 2848 Logo1_.exe 2848 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2184 3068 9b7135c8b57fbff60c86a22f79b74d64d869ca56015cd1fa3c386fafb2d0dde1.exe 28 PID 3068 wrote to memory of 2184 3068 9b7135c8b57fbff60c86a22f79b74d64d869ca56015cd1fa3c386fafb2d0dde1.exe 28 PID 3068 wrote to memory of 2184 3068 9b7135c8b57fbff60c86a22f79b74d64d869ca56015cd1fa3c386fafb2d0dde1.exe 28 PID 3068 wrote to memory of 2184 3068 9b7135c8b57fbff60c86a22f79b74d64d869ca56015cd1fa3c386fafb2d0dde1.exe 28 PID 2184 wrote to memory of 1544 2184 net.exe 30 PID 2184 wrote to memory of 1544 2184 net.exe 30 PID 2184 wrote to memory of 1544 2184 net.exe 30 PID 2184 wrote to memory of 1544 2184 net.exe 30 PID 3068 wrote to memory of 3040 3068 9b7135c8b57fbff60c86a22f79b74d64d869ca56015cd1fa3c386fafb2d0dde1.exe 31 PID 3068 wrote to memory of 3040 3068 9b7135c8b57fbff60c86a22f79b74d64d869ca56015cd1fa3c386fafb2d0dde1.exe 31 PID 3068 wrote to memory of 3040 3068 9b7135c8b57fbff60c86a22f79b74d64d869ca56015cd1fa3c386fafb2d0dde1.exe 31 PID 3068 wrote to memory of 3040 3068 9b7135c8b57fbff60c86a22f79b74d64d869ca56015cd1fa3c386fafb2d0dde1.exe 31 PID 3068 wrote to memory of 2848 3068 9b7135c8b57fbff60c86a22f79b74d64d869ca56015cd1fa3c386fafb2d0dde1.exe 33 PID 3068 wrote to memory of 2848 3068 9b7135c8b57fbff60c86a22f79b74d64d869ca56015cd1fa3c386fafb2d0dde1.exe 33 PID 3068 wrote to memory of 2848 3068 9b7135c8b57fbff60c86a22f79b74d64d869ca56015cd1fa3c386fafb2d0dde1.exe 33 PID 3068 wrote to memory of 2848 3068 9b7135c8b57fbff60c86a22f79b74d64d869ca56015cd1fa3c386fafb2d0dde1.exe 33 PID 3040 wrote to memory of 2900 3040 cmd.exe 34 PID 3040 wrote to memory of 2900 3040 cmd.exe 34 PID 3040 wrote to memory of 2900 3040 cmd.exe 34 PID 3040 wrote to memory of 2900 3040 cmd.exe 34 PID 2848 wrote to memory of 2720 2848 Logo1_.exe 35 PID 2848 wrote to memory of 2720 2848 Logo1_.exe 35 PID 2848 wrote to memory of 2720 2848 Logo1_.exe 35 PID 2848 wrote to memory of 2720 2848 Logo1_.exe 35 PID 2720 wrote to memory of 2656 2720 net.exe 37 PID 2720 wrote to memory of 2656 2720 net.exe 37 PID 2720 wrote to memory of 2656 2720 net.exe 37 PID 2720 wrote to memory of 2656 2720 net.exe 37 PID 2848 wrote to memory of 2068 2848 Logo1_.exe 38 PID 2848 wrote to memory of 2068 2848 Logo1_.exe 38 PID 2848 wrote to memory of 2068 2848 Logo1_.exe 38 PID 2848 wrote to memory of 2068 2848 Logo1_.exe 38 PID 2068 wrote to memory of 2088 2068 net.exe 40 PID 2068 wrote to memory of 2088 2068 net.exe 40 PID 2068 wrote to memory of 2088 2068 net.exe 40 PID 2068 wrote to memory of 2088 2068 net.exe 40 PID 2848 wrote to memory of 1196 2848 Logo1_.exe 21 PID 2848 wrote to memory of 1196 2848 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\9b7135c8b57fbff60c86a22f79b74d64d869ca56015cd1fa3c386fafb2d0dde1.exe"C:\Users\Admin\AppData\Local\Temp\9b7135c8b57fbff60c86a22f79b74d64d869ca56015cd1fa3c386fafb2d0dde1.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:1544
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a28C5.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\9b7135c8b57fbff60c86a22f79b74d64d869ca56015cd1fa3c386fafb2d0dde1.exe"C:\Users\Admin\AppData\Local\Temp\9b7135c8b57fbff60c86a22f79b74d64d869ca56015cd1fa3c386fafb2d0dde1.exe"4⤵
- Executes dropped EXE
PID:2900
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2656
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2088
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
484KB
MD57b714d463f7db900d5b6e757778a8ab8
SHA12cfc0e9f54236af8e10b0bfa551d87a20982b733
SHA256c995370836939a29853611830ca08d437286d4f45603edce88f36aa1f99a0d97
SHA512e8fe8823b5b7f282c24c964cbf4f248b7562259a13410bf95997288727f9bfc6ea51c4aa40182b649a2235bafc02062e0c57f4f62876b5174395071a8d68f9bb
-
Filesize
722B
MD583bf04888d45be16f3c4112ae6e0e06f
SHA11157755cc51fb84a28233b5fe54fc72240094b5d
SHA256beaf292c2896b676357b9b7988d2a83202244996e1bc1f7fe664739ed2114c30
SHA5121d27560aef881b6d74c3bede2829eacc8ad9304ed857deec4b96e2ac90af333afea5c15a8ecaff69f8ef1b112cb85e7af4f68e0cc3e4a19f6160d4cd1cdc45ec
-
C:\Users\Admin\AppData\Local\Temp\9b7135c8b57fbff60c86a22f79b74d64d869ca56015cd1fa3c386fafb2d0dde1.exe.exe
Filesize33KB
MD5bdbce90ce74990df3b2c7c8484dde146
SHA1ae6aadaf5467b97779d4c1a81b5cd3dfb9d8ecb4
SHA256f4a3c012f2859ead10af1298d9b20fbd8ca2257f73d530a2b0c25937cb16f6eb
SHA51278e2f31759ce490f38e898ef17a700dd0898cc32b526325e8d7230b4ff119c39124cd2abf30038f70318931cc995abee523b334a29812bf875302dc126c9f958
-
Filesize
39KB
MD53119e880ce5d6d029185f7ed591e11d0
SHA13ab197daedf94e992062faa4eda18905b87c75bb
SHA256b1eada5fd013195853bb65ee2b9fa55eb97840d20077d7a2fd43167800608eda
SHA51218cafd3a73312811037cb0e44a578670498b09350d72febd262d62528094b9ba738357ef861bb9cb7704097b9c930b9aa38ee5823520e22cf71d4ebb453bf4d7
-
Filesize
9B
MD560b1ffe4d5892b7ae054738eec1fd425
SHA180d4e944617f4132b1c6917345b158f3693f35c8
SHA2565e9944cc48c7ec641cf7b1b0125f47f26102c371a973612f0583f604bc3900d4
SHA5127f5c200924dbb5531df997e6a35cb94f36b54f5651284b0d6404f0576301125ef72b410a170fca889d46c033063663cfc7791f9e4c3c30695af069053eee66cc