Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
13/06/2024, 22:37
Static task
static1
Behavioral task
behavioral1
Sample
767470a0f78dadfdbb45957c392e2c8c0144f739a30472d2afa449538692bff0.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
767470a0f78dadfdbb45957c392e2c8c0144f739a30472d2afa449538692bff0.exe
Resource
win10v2004-20240611-en
General
-
Target
767470a0f78dadfdbb45957c392e2c8c0144f739a30472d2afa449538692bff0.exe
-
Size
5.7MB
-
MD5
7615fb659700e7717f77b88e28113e89
-
SHA1
bc2527db48050f702355397cd999dc889a54902b
-
SHA256
767470a0f78dadfdbb45957c392e2c8c0144f739a30472d2afa449538692bff0
-
SHA512
a180bc395e4317c88df3b7b839f1eb47369ba417fdc65e638c093498b0a175aa3940372375b6e01f409d653e4dc401ec3b0f205b4cf864323c9bfb86db883399
-
SSDEEP
49152:QPv94AEsKU8ggw1g+1CART5eBiyKS3EI3wybn20DCYIHvc8ixuZm9+fWsw6dTPBm:uKUgTH2M2m9UMpu1QfLczqssnKSh
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1948 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2488 Logo1_.exe 3008 767470a0f78dadfdbb45957c392e2c8c0144f739a30472d2afa449538692bff0.exe -
Loads dropped DLL 1 IoCs
pid Process 1948 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\Modules\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\bg\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fi\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Cultures\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Backgammon\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateSetup.exe Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\zu\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RICEPAPR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\SpringGreen\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Defender\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ast\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\RedistList\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\NETWORK\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ru\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java-rmi.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jdb.exe Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fur\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Mail\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\8.0\x86\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Defender\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\groove.net\Components\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Americana\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Photo Viewer\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\mai\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\A3DUtility.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\etc\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\1049\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\html\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\images\in_sidebar\_desktop.ini Logo1_.exe File created C:\Program Files\MSBuild\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\Help\en_US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{F96176C3-DF21-4B86-99D6-0A9EE05DDA5E}\chrome_installer.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Defender\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gu\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\FreeCell\es-ES\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 767470a0f78dadfdbb45957c392e2c8c0144f739a30472d2afa449538692bff0.exe File created C:\Windows\Logo1_.exe 767470a0f78dadfdbb45957c392e2c8c0144f739a30472d2afa449538692bff0.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2488 Logo1_.exe 2488 Logo1_.exe 2488 Logo1_.exe 2488 Logo1_.exe 2488 Logo1_.exe 2488 Logo1_.exe 2488 Logo1_.exe 2488 Logo1_.exe 2488 Logo1_.exe 2488 Logo1_.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 772 wrote to memory of 1948 772 767470a0f78dadfdbb45957c392e2c8c0144f739a30472d2afa449538692bff0.exe 28 PID 772 wrote to memory of 1948 772 767470a0f78dadfdbb45957c392e2c8c0144f739a30472d2afa449538692bff0.exe 28 PID 772 wrote to memory of 1948 772 767470a0f78dadfdbb45957c392e2c8c0144f739a30472d2afa449538692bff0.exe 28 PID 772 wrote to memory of 1948 772 767470a0f78dadfdbb45957c392e2c8c0144f739a30472d2afa449538692bff0.exe 28 PID 772 wrote to memory of 2488 772 767470a0f78dadfdbb45957c392e2c8c0144f739a30472d2afa449538692bff0.exe 29 PID 772 wrote to memory of 2488 772 767470a0f78dadfdbb45957c392e2c8c0144f739a30472d2afa449538692bff0.exe 29 PID 772 wrote to memory of 2488 772 767470a0f78dadfdbb45957c392e2c8c0144f739a30472d2afa449538692bff0.exe 29 PID 772 wrote to memory of 2488 772 767470a0f78dadfdbb45957c392e2c8c0144f739a30472d2afa449538692bff0.exe 29 PID 2488 wrote to memory of 2688 2488 Logo1_.exe 31 PID 2488 wrote to memory of 2688 2488 Logo1_.exe 31 PID 2488 wrote to memory of 2688 2488 Logo1_.exe 31 PID 2488 wrote to memory of 2688 2488 Logo1_.exe 31 PID 2688 wrote to memory of 2712 2688 net.exe 33 PID 2688 wrote to memory of 2712 2688 net.exe 33 PID 2688 wrote to memory of 2712 2688 net.exe 33 PID 2688 wrote to memory of 2712 2688 net.exe 33 PID 2488 wrote to memory of 1336 2488 Logo1_.exe 21 PID 2488 wrote to memory of 1336 2488 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1336
-
C:\Users\Admin\AppData\Local\Temp\767470a0f78dadfdbb45957c392e2c8c0144f739a30472d2afa449538692bff0.exe"C:\Users\Admin\AppData\Local\Temp\767470a0f78dadfdbb45957c392e2c8c0144f739a30472d2afa449538692bff0.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aB08.bat3⤵
- Deletes itself
- Loads dropped DLL
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\767470a0f78dadfdbb45957c392e2c8c0144f739a30472d2afa449538692bff0.exe"C:\Users\Admin\AppData\Local\Temp\767470a0f78dadfdbb45957c392e2c8c0144f739a30472d2afa449538692bff0.exe"4⤵
- Executes dropped EXE
PID:3008
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2712
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
252KB
MD507dfea84a37074ab4aeee668afefc263
SHA12a735d75fa11191ddec37aad6552ada029bb286d
SHA256bc8f1ef7ad9dd42375c3841bc745155326fe7b04e5f7b258feb078a9e58a48b6
SHA512c594c418adfff394998bd107c9c168f9dd3fbd21d2e6b24309005d126a695e4fc17fb88fb43a9a6a31197ba26e8779518e40ac360a5b7dfe53a232a4bf19076c
-
Filesize
472KB
MD588eb1bca8c399bc3f46e99cdde2f047e
SHA155fafbceb011e1af2edced978686a90971bd95f2
SHA25642fd78c05bc240d4ded16ac974f17c336f6ae3a1814d548021c48a942cc30428
SHA512149d4de0c024e25a13a7bb17471e6f48391d4f26b1c8388672320eed1c255f84219ad7b72bbebc531ae558d5192dd4bb6d0dddd6c65a45300c8e8348a4fb3728
-
Filesize
721B
MD55e50ba96db65a37cb8d1ee528789ea05
SHA1f9bfd5c9c9dcb594caae7e38f82cd05a4d445613
SHA256a8bd5aa4ba5b7022bcf8c3a994cd0558e77e767db158b46294fc1fff896c2601
SHA512736f459f6cab5f86ad0a5fb3d03f63bebbdc93edeed7deb5767bc5f6e26e1afc512698e83c5761d2048dfae99ecc7a7bdb5c4b3869079e0b309549e0f9fdf8f7
-
C:\Users\Admin\AppData\Local\Temp\767470a0f78dadfdbb45957c392e2c8c0144f739a30472d2afa449538692bff0.exe.exe
Filesize5.7MB
MD5c596c3539f619ec76f36741933da5bed
SHA1b3243f0ee893528f0ccd71700ca9970def6670b5
SHA256bb9f95d1b280c1ec9ae27cf564bbb1b485e2d721d44b3288a9a43c07517e38de
SHA512e6e9bd571f8a74b0d2f1a88f9c90fbf10a2150cda55cd4ad6f9a37e0c4a957a175ecb8adf17822331e6cb83bac6fec5bdc2fc87fdb5bc2bfa46ad7dac4df31d2
-
Filesize
27KB
MD5e7022dfd7727b47fccc1c511a84e8c53
SHA19e258e645aa3df99b556e98bbe7390308014fbe9
SHA256cffb794dcc2ef8b81c440fe0bc09f3172040e73d1ac9ef9e3a108ebb822a89e4
SHA51269cb26c5dc0f6f4dd7d0ad32d921799bdba0cedfe063246a6c526872c9f211267e3e5989fcaa1f35ea19d4b06dd44f9d3d032db5b28f9a69581558d3eb2ebac9
-
Filesize
9B
MD54f2460b507685f7d7bfe6393f335f1c9
SHA1378d42f114b1515872e58de6662373af31ab8c7b
SHA25647a22297ce31d17b0f37251ce63cf2eb146700451caab6dd0aa710d2526c8e42
SHA51275dcca6b81ac47511b847a5c35be4bddbee425436f7bfd1347115e18b84f52a16a5c517bda0a5f5d0a1f2541aab80d764932d8018538cb112fa3b6c9977e95eb