Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
01/07/2024, 18:25
Static task
static1
Behavioral task
behavioral1
Sample
5eac9f46a903bfb3f31fd5950814c6ee5f73cb2c5be31e719527e7fd4b22287e.exe
Resource
win7-20240611-en
General
-
Target
5eac9f46a903bfb3f31fd5950814c6ee5f73cb2c5be31e719527e7fd4b22287e.exe
-
Size
717KB
-
MD5
cd5563fb7456d0d482c92584f91473ee
-
SHA1
72d321a7d604bd7aeb8be1ebf081cb0c528fe869
-
SHA256
5eac9f46a903bfb3f31fd5950814c6ee5f73cb2c5be31e719527e7fd4b22287e
-
SHA512
ea4b622e020a0f72cc6bae973379de00ba7535091a6fbbf56068f3a26881e007656c00768074d06fa0a49eee4ae4290b2653b4f4042362329e5dc8b2f4931141
-
SSDEEP
12288:rRfC6Aj+TN5uixZN+8rKhUdTC/wE1ZD0Ca5ZIXV:rRLOS2opPIXV
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2648 cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 2668 Logo1_.exe 2860 5eac9f46a903bfb3f31fd5950814c6ee5f73cb2c5be31e719527e7fd4b22287e.exe 1288 Explorer.EXE -
Loads dropped DLL 3 IoCs
pid Process 2648 cmd.exe 2648 cmd.exe 1288 Explorer.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\VideoLAN\VLC\locale\ar\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\el\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\access\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nl\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\an\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\uz\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Journal\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\MSOICONS.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\server\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\chkrzm.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\bg\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\DEEPBLUE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Internet Explorer\SIGNUP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk16\windows-amd64\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ssvagent.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bs\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\da\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\si\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sm\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\lua\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Media Player\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\policytool.exe Logo1_.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gd\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Mail\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\Pacific\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\on_desktop\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\pack200.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{5889422B-4E7B-4F63-944F-9F172CF77CBB}\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\nb\LC_MESSAGES\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 5eac9f46a903bfb3f31fd5950814c6ee5f73cb2c5be31e719527e7fd4b22287e.exe File created C:\Windows\Logo1_.exe 5eac9f46a903bfb3f31fd5950814c6ee5f73cb2c5be31e719527e7fd4b22287e.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 1176 5eac9f46a903bfb3f31fd5950814c6ee5f73cb2c5be31e719527e7fd4b22287e.exe 1176 5eac9f46a903bfb3f31fd5950814c6ee5f73cb2c5be31e719527e7fd4b22287e.exe 1176 5eac9f46a903bfb3f31fd5950814c6ee5f73cb2c5be31e719527e7fd4b22287e.exe 1176 5eac9f46a903bfb3f31fd5950814c6ee5f73cb2c5be31e719527e7fd4b22287e.exe 1176 5eac9f46a903bfb3f31fd5950814c6ee5f73cb2c5be31e719527e7fd4b22287e.exe 1176 5eac9f46a903bfb3f31fd5950814c6ee5f73cb2c5be31e719527e7fd4b22287e.exe 1176 5eac9f46a903bfb3f31fd5950814c6ee5f73cb2c5be31e719527e7fd4b22287e.exe 1176 5eac9f46a903bfb3f31fd5950814c6ee5f73cb2c5be31e719527e7fd4b22287e.exe 1176 5eac9f46a903bfb3f31fd5950814c6ee5f73cb2c5be31e719527e7fd4b22287e.exe 1176 5eac9f46a903bfb3f31fd5950814c6ee5f73cb2c5be31e719527e7fd4b22287e.exe 1176 5eac9f46a903bfb3f31fd5950814c6ee5f73cb2c5be31e719527e7fd4b22287e.exe 1176 5eac9f46a903bfb3f31fd5950814c6ee5f73cb2c5be31e719527e7fd4b22287e.exe 1176 5eac9f46a903bfb3f31fd5950814c6ee5f73cb2c5be31e719527e7fd4b22287e.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1176 wrote to memory of 2376 1176 5eac9f46a903bfb3f31fd5950814c6ee5f73cb2c5be31e719527e7fd4b22287e.exe 28 PID 1176 wrote to memory of 2376 1176 5eac9f46a903bfb3f31fd5950814c6ee5f73cb2c5be31e719527e7fd4b22287e.exe 28 PID 1176 wrote to memory of 2376 1176 5eac9f46a903bfb3f31fd5950814c6ee5f73cb2c5be31e719527e7fd4b22287e.exe 28 PID 1176 wrote to memory of 2376 1176 5eac9f46a903bfb3f31fd5950814c6ee5f73cb2c5be31e719527e7fd4b22287e.exe 28 PID 2376 wrote to memory of 2740 2376 net.exe 30 PID 2376 wrote to memory of 2740 2376 net.exe 30 PID 2376 wrote to memory of 2740 2376 net.exe 30 PID 2376 wrote to memory of 2740 2376 net.exe 30 PID 1176 wrote to memory of 2648 1176 5eac9f46a903bfb3f31fd5950814c6ee5f73cb2c5be31e719527e7fd4b22287e.exe 31 PID 1176 wrote to memory of 2648 1176 5eac9f46a903bfb3f31fd5950814c6ee5f73cb2c5be31e719527e7fd4b22287e.exe 31 PID 1176 wrote to memory of 2648 1176 5eac9f46a903bfb3f31fd5950814c6ee5f73cb2c5be31e719527e7fd4b22287e.exe 31 PID 1176 wrote to memory of 2648 1176 5eac9f46a903bfb3f31fd5950814c6ee5f73cb2c5be31e719527e7fd4b22287e.exe 31 PID 1176 wrote to memory of 2668 1176 5eac9f46a903bfb3f31fd5950814c6ee5f73cb2c5be31e719527e7fd4b22287e.exe 33 PID 1176 wrote to memory of 2668 1176 5eac9f46a903bfb3f31fd5950814c6ee5f73cb2c5be31e719527e7fd4b22287e.exe 33 PID 1176 wrote to memory of 2668 1176 5eac9f46a903bfb3f31fd5950814c6ee5f73cb2c5be31e719527e7fd4b22287e.exe 33 PID 1176 wrote to memory of 2668 1176 5eac9f46a903bfb3f31fd5950814c6ee5f73cb2c5be31e719527e7fd4b22287e.exe 33 PID 2668 wrote to memory of 2748 2668 Logo1_.exe 34 PID 2668 wrote to memory of 2748 2668 Logo1_.exe 34 PID 2668 wrote to memory of 2748 2668 Logo1_.exe 34 PID 2668 wrote to memory of 2748 2668 Logo1_.exe 34 PID 2648 wrote to memory of 2860 2648 cmd.exe 36 PID 2648 wrote to memory of 2860 2648 cmd.exe 36 PID 2648 wrote to memory of 2860 2648 cmd.exe 36 PID 2648 wrote to memory of 2860 2648 cmd.exe 36 PID 2748 wrote to memory of 2772 2748 net.exe 37 PID 2748 wrote to memory of 2772 2748 net.exe 37 PID 2748 wrote to memory of 2772 2748 net.exe 37 PID 2748 wrote to memory of 2772 2748 net.exe 37 PID 2668 wrote to memory of 2472 2668 Logo1_.exe 38 PID 2668 wrote to memory of 2472 2668 Logo1_.exe 38 PID 2668 wrote to memory of 2472 2668 Logo1_.exe 38 PID 2668 wrote to memory of 2472 2668 Logo1_.exe 38 PID 2472 wrote to memory of 2612 2472 net.exe 40 PID 2472 wrote to memory of 2612 2472 net.exe 40 PID 2472 wrote to memory of 2612 2472 net.exe 40 PID 2472 wrote to memory of 2612 2472 net.exe 40 PID 2668 wrote to memory of 1288 2668 Logo1_.exe 21 PID 2668 wrote to memory of 1288 2668 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1288 -
C:\Users\Admin\AppData\Local\Temp\5eac9f46a903bfb3f31fd5950814c6ee5f73cb2c5be31e719527e7fd4b22287e.exe"C:\Users\Admin\AppData\Local\Temp\5eac9f46a903bfb3f31fd5950814c6ee5f73cb2c5be31e719527e7fd4b22287e.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2740
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a59F2.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\5eac9f46a903bfb3f31fd5950814c6ee5f73cb2c5be31e719527e7fd4b22287e.exe"C:\Users\Admin\AppData\Local\Temp\5eac9f46a903bfb3f31fd5950814c6ee5f73cb2c5be31e719527e7fd4b22287e.exe"4⤵
- Executes dropped EXE
PID:2860
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2772
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2612
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258KB
MD5920aa02bc54d3ba29c445e3a171fc5ea
SHA11c58fd6fdfa1c582a442a34d4725d61a850b0363
SHA25605867d8f2ececd59d608188da2ce1a18fa0bc388c4896778c1909e36039db537
SHA5129d34fa3a6f4111d95c7086d31984dd6fdd606a50e567f4f75d798e5a8bebcfbe2952056cc23fcdd0d6e51780f7dd1dd41101a1f067bbbb7002710d59d40d0a3c
-
Filesize
478KB
MD585bfd80e5e2a61689d1273c6efa51ccc
SHA18ae8a160124cc56983f24a933fbecdac08da435a
SHA256892cf1575e0cc60639951f9a5a37323f3ca7d06f335e8a39635c3b858596ea3c
SHA51296dd851f4d17a65aa6dfddfdc134a46d30b0417451b4c4b31092b66056cae59302d49b706294547e5766e347dc368ff4bd176d90376c5e2ad5c7a52aa8718a79
-
Filesize
722B
MD555848c570a025081c0e12fff7ac22330
SHA1166262621a16e562869705ea3c31d09ae6204ad5
SHA256c0968a70ecda6a3595ae3f54992360443525ecc467d9b835bf06c646ce40a214
SHA512135a847e79bf0e87d0a2bd6ea8dc8706236bdc5aae927c0f72b370e6b04fe36f97f00b8c6622ef4810b3568da140af7f46e5f3df57945ca561d89842df4da105
-
C:\Users\Admin\AppData\Local\Temp\5eac9f46a903bfb3f31fd5950814c6ee5f73cb2c5be31e719527e7fd4b22287e.exe.exe
Filesize684KB
MD550f289df0c19484e970849aac4e6f977
SHA13dc77c8830836ab844975eb002149b66da2e10be
SHA256b9b179b305c5268ad428b6ae59de10b4fe99cf0199bbc89b7017181905e97305
SHA512877d852ea1062b90e2fd2f3c4dc7d05d9697e9a9b2929c830a770b62741f6a11e06de73275eb871113f11143faf1cb40d99f7c247862ffb778d26833ed5d7e38
-
Filesize
33KB
MD5933403c035bedeaf409ff1a3d7bb394f
SHA127765fb7a74adda8b6b4d740a79e83fca3301e79
SHA25611a73da3698c3448e24744bdc72a155bb756676dcc7e03264d723ca91ce87a54
SHA51236f17b6beb74f2d11cf74a211719c0ab5c09ad289055917168cdb1d3355cfdf2cd917f008e3c8b51d408d1f6dd1fdda692e50c6dcbeeaf4917adad7cc769b2d0
-
Filesize
8B
MD587cbd7a2d7bdb443a36ecfb46e39db18
SHA112aac09be13003e857809ea9434c76126ac39bbf
SHA256fe5e34894849bd441c429cfd17e62e06b828a82b04c9f0e7cadd884d78b326e1
SHA51275b0b484285909c577f97dd2b748e8b6e905b2a37dc8a569519325e67cac8b8932fbbd52c754df787e2a6326a9ca575e5d37372a9635718a310c642457ed17e0