Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
29/06/2024, 22:22
Static task
static1
Behavioral task
behavioral1
Sample
7e4017cce5f5a16033ebd00f6131dff808c08d64e9d9187779373d3bf39b7d15.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7e4017cce5f5a16033ebd00f6131dff808c08d64e9d9187779373d3bf39b7d15.exe
Resource
win10v2004-20240508-en
General
-
Target
7e4017cce5f5a16033ebd00f6131dff808c08d64e9d9187779373d3bf39b7d15.exe
-
Size
364KB
-
MD5
361e667717528f22e068f3abc45ba497
-
SHA1
ade8b16a05244f282ef3c59d0269836054456316
-
SHA256
7e4017cce5f5a16033ebd00f6131dff808c08d64e9d9187779373d3bf39b7d15
-
SHA512
33604be924fefcdf251e4e5579f9c625f98e3753e3eca4f98ecc1dc86d59f2d069b26e426be6e478d6162fbaeea72931cb3ddd20c00b22a0d967b8e1167686d6
-
SSDEEP
6144:XuJPzU66bkWmchVySqkvAH3qo0wWJC6G/SMT4FWqC:wU66b5zhVymA/XSRh
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2344 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2356 Logo1_.exe 2708 7e4017cce5f5a16033ebd00f6131dff808c08d64e9d9187779373d3bf39b7d15.exe -
Loads dropped DLL 1 IoCs
pid Process 2344 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\VideoLAN\VLC\locale\de\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmlaunch.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RADIAL\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\3082\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Mail\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ga\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Mahjong\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTO\10.0\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\or_IN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\BORDERS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.rcp.product_5.5.0.165303\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\DEEPBLUE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\zu\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\en-US\js\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp.zh_CN_5.5.0.165303\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ca\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\Welcome Tool\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\Computers\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\da\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hy\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Africa\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.core_5.5.0.165303\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Extensions\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sq\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_chroma\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\fr\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ff\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ml\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Journal\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\Contracts\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\Bin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Adobe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\th\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jps.exe Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 7e4017cce5f5a16033ebd00f6131dff808c08d64e9d9187779373d3bf39b7d15.exe File created C:\Windows\Logo1_.exe 7e4017cce5f5a16033ebd00f6131dff808c08d64e9d9187779373d3bf39b7d15.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2356 Logo1_.exe 2356 Logo1_.exe 2356 Logo1_.exe 2356 Logo1_.exe 2356 Logo1_.exe 2356 Logo1_.exe 2356 Logo1_.exe 2356 Logo1_.exe 2356 Logo1_.exe 2356 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2344 2100 7e4017cce5f5a16033ebd00f6131dff808c08d64e9d9187779373d3bf39b7d15.exe 28 PID 2100 wrote to memory of 2344 2100 7e4017cce5f5a16033ebd00f6131dff808c08d64e9d9187779373d3bf39b7d15.exe 28 PID 2100 wrote to memory of 2344 2100 7e4017cce5f5a16033ebd00f6131dff808c08d64e9d9187779373d3bf39b7d15.exe 28 PID 2100 wrote to memory of 2344 2100 7e4017cce5f5a16033ebd00f6131dff808c08d64e9d9187779373d3bf39b7d15.exe 28 PID 2100 wrote to memory of 2356 2100 7e4017cce5f5a16033ebd00f6131dff808c08d64e9d9187779373d3bf39b7d15.exe 29 PID 2100 wrote to memory of 2356 2100 7e4017cce5f5a16033ebd00f6131dff808c08d64e9d9187779373d3bf39b7d15.exe 29 PID 2100 wrote to memory of 2356 2100 7e4017cce5f5a16033ebd00f6131dff808c08d64e9d9187779373d3bf39b7d15.exe 29 PID 2100 wrote to memory of 2356 2100 7e4017cce5f5a16033ebd00f6131dff808c08d64e9d9187779373d3bf39b7d15.exe 29 PID 2356 wrote to memory of 2600 2356 Logo1_.exe 31 PID 2356 wrote to memory of 2600 2356 Logo1_.exe 31 PID 2356 wrote to memory of 2600 2356 Logo1_.exe 31 PID 2356 wrote to memory of 2600 2356 Logo1_.exe 31 PID 2344 wrote to memory of 2708 2344 cmd.exe 32 PID 2344 wrote to memory of 2708 2344 cmd.exe 32 PID 2344 wrote to memory of 2708 2344 cmd.exe 32 PID 2344 wrote to memory of 2708 2344 cmd.exe 32 PID 2600 wrote to memory of 2460 2600 net.exe 34 PID 2600 wrote to memory of 2460 2600 net.exe 34 PID 2600 wrote to memory of 2460 2600 net.exe 34 PID 2600 wrote to memory of 2460 2600 net.exe 34 PID 2356 wrote to memory of 1188 2356 Logo1_.exe 21 PID 2356 wrote to memory of 1188 2356 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1188
-
C:\Users\Admin\AppData\Local\Temp\7e4017cce5f5a16033ebd00f6131dff808c08d64e9d9187779373d3bf39b7d15.exe"C:\Users\Admin\AppData\Local\Temp\7e4017cce5f5a16033ebd00f6131dff808c08d64e9d9187779373d3bf39b7d15.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a1EF6.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\7e4017cce5f5a16033ebd00f6131dff808c08d64e9d9187779373d3bf39b7d15.exe"C:\Users\Admin\AppData\Local\Temp\7e4017cce5f5a16033ebd00f6131dff808c08d64e9d9187779373d3bf39b7d15.exe"4⤵
- Executes dropped EXE
PID:2708
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2460
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD5e361c4ee7e678f75fde74113fcc34369
SHA1107561a4f23b2f9f6f6d2014f145907e085616a9
SHA25646bf981f69c4e1d4565aabeab4988cf233e9e04ddf0a1286b8b41f4a031bc7da
SHA5122f3057b98c587848b1276790042a8506247c29fa2d000295bbc4d1a679c4b355d208983332da37fc31935c94a3328a8423cafccd26443e787ed5b38a83ca3668
-
Filesize
474KB
MD5c14a5111b798cff20d7d66b0e035d409
SHA129f0894552b30815fed6ad231b5721e876869552
SHA256fd6f57dc1b82f6301cbecbf9db5728a9a69b10e3edbf4f8a1dfef571c77a6cb6
SHA512a4d8b74216c76fa3d48ab7300452725602bc6d5bcc0e6c23d458d65362cd24751f23755180ae69633090b172e95f18f225c0cb4a71dd1e050d8b3dff466e7f1b
-
Filesize
722B
MD5cbcb1bee77408a955cc7cc58c2818746
SHA15762e7946fd6e0883b92abde2520db107f2c63d4
SHA2562926f4bb5c002b1f2e7e4deebb78fe40282c8f6ceaec8ab52f5da758d086882b
SHA512aedfdc5b299ae21d9f05dcea40d7c0da9d89126b584b5d9ae5ee940be8871d7e0385b4eb4d516232b3181961089ec26ec33c182d1c41e43abbd822d639901fe6
-
C:\Users\Admin\AppData\Local\Temp\7e4017cce5f5a16033ebd00f6131dff808c08d64e9d9187779373d3bf39b7d15.exe.exe
Filesize335KB
MD540ac62c087648ccc2c58dae066d34c98
SHA10e87efb6ddfe59e534ea9e829cad35be8563e5f7
SHA256482c4c1562490e164d5f17990253373691aa5eab55a81c7f890fe9583a9ea916
SHA5120c1ff13ff88409d54fee2ceb07fe65135ce2a9aa6f8da51ac0158abb2cfbb3a898ef26f476931986f1367622f21a7c0b0e742d0f4de8be6e215596b0d88c518f
-
Filesize
29KB
MD52dc511c4f3ce6fb100008f50e863289b
SHA12da48011d287e4d25a272b69379d345e59e693de
SHA25622b25e11f1c7a43ece9d027609b9f7358bb47df7796d786adc0d04fdd5e93e3d
SHA512743ae328b0b8d71639fedff1a15ca8b118370a60606bc647b9a01dc65364b5490cb148e25d47048680394bb83e0f8ae6fb5abc5a6b63f43b589b4c48ba5f1469
-
Filesize
9B
MD52822854d33e24347f613c750df46b810
SHA1c2ea2529c032aa552d5a8301900cf27fc0f6045c
SHA25673f2f888bdeaf9427c7aa3355fbe711e6570fb5e9e48c3f64cd229198ce85ad2
SHA51221fff5d14e03a0420d9242a095c2e93ac2b7e6b9e49d12da907394ac9725bb746896721ceded88411895e9630a8ffbface168f0c02630b33300647d3d9e3326c