Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
16/06/2024, 18:20
Static task
static1
Behavioral task
behavioral1
Sample
5e3c5ab150b906815bea2449b120393ec71f2249e8a0b8f992f242b13847eef8.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5e3c5ab150b906815bea2449b120393ec71f2249e8a0b8f992f242b13847eef8.exe
Resource
win10v2004-20240611-en
General
-
Target
5e3c5ab150b906815bea2449b120393ec71f2249e8a0b8f992f242b13847eef8.exe
-
Size
568KB
-
MD5
587ea9b0c403691d463cffda0f57fb17
-
SHA1
6054061be509c66800fc5e92b1dd3212eadd1f64
-
SHA256
5e3c5ab150b906815bea2449b120393ec71f2249e8a0b8f992f242b13847eef8
-
SHA512
75346273bea889409f916da81f7462c0d7db300e0ab533743186913024bbbe41a2f3703baa8505b6d65cc593b9efa295b870e15094c82a796d7e870b1c280213
-
SSDEEP
12288:U7+ovP+BNSebhEFoUbElY7dx0Gyz1batvex:U7WhiFoUbEwdngx
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2960 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1724 Logo1_.exe 2644 5e3c5ab150b906815bea2449b120393ec71f2249e8a0b8f992f242b13847eef8.exe -
Loads dropped DLL 1 IoCs
pid Process 2960 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Effects\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Oasis\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fi\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSClientDataMgr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RICEPAPR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\core\locale\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VBA\VBA7\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Australia\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Temp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TextConv\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\Part\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\cgg\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Photo Viewer\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\GRPHFLT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Update\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BrightYellow\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\or_IN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ro\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\lib\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javafxpackager.exe Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\dropins\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64_1.1.200.v20141007-2033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Antarctica\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Stationery\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\Media Renderer\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1036\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\fonts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\mr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\7-Zip\7zG.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SLATE\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\hy\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RICEPAPR\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Spades\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 5e3c5ab150b906815bea2449b120393ec71f2249e8a0b8f992f242b13847eef8.exe File created C:\Windows\Logo1_.exe 5e3c5ab150b906815bea2449b120393ec71f2249e8a0b8f992f242b13847eef8.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1724 Logo1_.exe 1724 Logo1_.exe 1724 Logo1_.exe 1724 Logo1_.exe 1724 Logo1_.exe 1724 Logo1_.exe 1724 Logo1_.exe 1724 Logo1_.exe 1724 Logo1_.exe 1724 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2060 wrote to memory of 2960 2060 5e3c5ab150b906815bea2449b120393ec71f2249e8a0b8f992f242b13847eef8.exe 28 PID 2060 wrote to memory of 2960 2060 5e3c5ab150b906815bea2449b120393ec71f2249e8a0b8f992f242b13847eef8.exe 28 PID 2060 wrote to memory of 2960 2060 5e3c5ab150b906815bea2449b120393ec71f2249e8a0b8f992f242b13847eef8.exe 28 PID 2060 wrote to memory of 2960 2060 5e3c5ab150b906815bea2449b120393ec71f2249e8a0b8f992f242b13847eef8.exe 28 PID 2060 wrote to memory of 1724 2060 5e3c5ab150b906815bea2449b120393ec71f2249e8a0b8f992f242b13847eef8.exe 30 PID 2060 wrote to memory of 1724 2060 5e3c5ab150b906815bea2449b120393ec71f2249e8a0b8f992f242b13847eef8.exe 30 PID 2060 wrote to memory of 1724 2060 5e3c5ab150b906815bea2449b120393ec71f2249e8a0b8f992f242b13847eef8.exe 30 PID 2060 wrote to memory of 1724 2060 5e3c5ab150b906815bea2449b120393ec71f2249e8a0b8f992f242b13847eef8.exe 30 PID 1724 wrote to memory of 1996 1724 Logo1_.exe 31 PID 1724 wrote to memory of 1996 1724 Logo1_.exe 31 PID 1724 wrote to memory of 1996 1724 Logo1_.exe 31 PID 1724 wrote to memory of 1996 1724 Logo1_.exe 31 PID 2960 wrote to memory of 2644 2960 cmd.exe 33 PID 2960 wrote to memory of 2644 2960 cmd.exe 33 PID 2960 wrote to memory of 2644 2960 cmd.exe 33 PID 2960 wrote to memory of 2644 2960 cmd.exe 33 PID 1996 wrote to memory of 2656 1996 net.exe 34 PID 1996 wrote to memory of 2656 1996 net.exe 34 PID 1996 wrote to memory of 2656 1996 net.exe 34 PID 1996 wrote to memory of 2656 1996 net.exe 34 PID 1724 wrote to memory of 1236 1724 Logo1_.exe 21 PID 1724 wrote to memory of 1236 1724 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\5e3c5ab150b906815bea2449b120393ec71f2249e8a0b8f992f242b13847eef8.exe"C:\Users\Admin\AppData\Local\Temp\5e3c5ab150b906815bea2449b120393ec71f2249e8a0b8f992f242b13847eef8.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a2BB2.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\5e3c5ab150b906815bea2449b120393ec71f2249e8a0b8f992f242b13847eef8.exe"C:\Users\Admin\AppData\Local\Temp\5e3c5ab150b906815bea2449b120393ec71f2249e8a0b8f992f242b13847eef8.exe"4⤵
- Executes dropped EXE
PID:2644
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2656
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5533ce215a7c274602dc456ca375cef93
SHA176c502d7c45eca3fd96f6b04eb850e751bc785dd
SHA256d70c9f73bbeed5cbc0df4a4d14bae68789f84d8092281337d2919322b288ce9c
SHA51209d9dee36c48567921de4b7c31c4a822d5f9ed5e0b1cb0330031b320f40b5ba9b15e89dc37d52561094642c0ff16c14d32e81ed5b1dac06150fefbbd6f3365bf
-
Filesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
Filesize
722B
MD54b8ee957eb89e9fce6853c618601ef1c
SHA11c5ca448937fa14837b26cf397e203437a482d60
SHA256f885e3367544335cb483793ed4b1c92294ae966cd01a18f3231bb102331d9dba
SHA51254aa0710e202836e8284b313b712eb0c14b7e1a32f084831b35c2c8a5097e4c2503dea8d8af27ce018bf4073359e23006d268019c7aef4314f4e83b27b902936
-
C:\Users\Admin\AppData\Local\Temp\5e3c5ab150b906815bea2449b120393ec71f2249e8a0b8f992f242b13847eef8.exe.exe
Filesize542KB
MD5f41760229b98eefe702a4a5bbf6481a5
SHA1139bc04d1466405b85e736f2dc861c125700cb80
SHA2565279d9f6c41db7c9a13ce2f82fa0ad108904c9a2892ff1ec0c19a16eaab80a07
SHA512c1ae8dd8dd3b15bb361cdf7a059406ffd174116aea2ae0ec972989b1efe1d0068f5600b67c4acde8a920af8354674f8eacce6d92257c69ec4b93d90a6c34aff5
-
Filesize
26KB
MD5925efa8e6ec043b04fdaf9e6c9f95b9f
SHA14bb883e016bdeecc3f21b562df6364944b777ae3
SHA2566513ef9968b68f982fb83460b5919e55470f514db71c3831c2ea5c7b3a2721db
SHA512bf4978b5b10932de14d0c64566768708331f89a815f153323173506aecc296236a22d387b5caceba100c72b44e6b870e879f7350f1abce413bb92d54e70b133e
-
Filesize
9B
MD51884bfdeea71ff22db39c196f4447c9c
SHA13eafc7e6e17ba6ce7a087a3588fb1efb596da038
SHA256163167bc5a01ad6b3ed4406c2a9a1baaf2c0ef4620ab7d5b39aeddf976ca776d
SHA512b22124aa3a912462e6face7f71ad3dfec4b27dab16b2e20e3a0adc277f89f631ec889c91b185ac4b9b670933d881b8fd26c25d6f405e465aa8148cdbb7f7c3e2