Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
16/07/2024, 06:52
Static task
static1
Behavioral task
behavioral1
Sample
2d859c225937f092cd7ded70b7668b979f0d3cb45264c0590f67717ad25f7175.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2d859c225937f092cd7ded70b7668b979f0d3cb45264c0590f67717ad25f7175.exe
Resource
win10v2004-20240709-en
General
-
Target
2d859c225937f092cd7ded70b7668b979f0d3cb45264c0590f67717ad25f7175.exe
-
Size
907KB
-
MD5
03eee3da3ae6646dae54754d7e1f3c11
-
SHA1
7039a48929348f7f87d393e88b47966c8b3b7efd
-
SHA256
2d859c225937f092cd7ded70b7668b979f0d3cb45264c0590f67717ad25f7175
-
SHA512
6a772b16ccd30359e7020c903531557967fe4bc1730f69c518582c38775a87b08d4d2130e7d9077050a56a807a5ee6a056104f99598b16085b275a0ad18ab651
-
SSDEEP
24576:/7XuuBj3ZXqv05z2V2KxwnX3S4LZu9UvZfR:/7XV5q85KwX3SGZu9mZfR
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1152 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2060 Logo1_.exe 2260 2d859c225937f092cd7ded70b7668b979f0d3cb45264c0590f67717ad25f7175.exe -
Loads dropped DLL 1 IoCs
pid Process 1152 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\.settings\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\include\win32\bridge\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\jfr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Extensions\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hu\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\lib\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\hrtfs\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\da\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\AddInViews\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files\Mozilla Firefox\uninstall\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Photo Viewer\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Portal\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Bibliography\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec.exe Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\kk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\ENFR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jarsigner.exe Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ARCTIC\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\.settings\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\Sounds\People\_desktop.ini Logo1_.exe File created C:\Program Files\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\LISTS\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Library\SOLVER\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_platform_specific\win_x64\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Biscay\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\1036\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\FreeCell\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft.NET\RedistList\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ach\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\LEVEL\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Logo1_.exe 2d859c225937f092cd7ded70b7668b979f0d3cb45264c0590f67717ad25f7175.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 2d859c225937f092cd7ded70b7668b979f0d3cb45264c0590f67717ad25f7175.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2060 Logo1_.exe 2060 Logo1_.exe 2060 Logo1_.exe 2060 Logo1_.exe 2060 Logo1_.exe 2060 Logo1_.exe 2260 2d859c225937f092cd7ded70b7668b979f0d3cb45264c0590f67717ad25f7175.exe 2060 Logo1_.exe 2060 Logo1_.exe 2060 Logo1_.exe 2060 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 3016 wrote to memory of 1152 3016 2d859c225937f092cd7ded70b7668b979f0d3cb45264c0590f67717ad25f7175.exe 30 PID 3016 wrote to memory of 1152 3016 2d859c225937f092cd7ded70b7668b979f0d3cb45264c0590f67717ad25f7175.exe 30 PID 3016 wrote to memory of 1152 3016 2d859c225937f092cd7ded70b7668b979f0d3cb45264c0590f67717ad25f7175.exe 30 PID 3016 wrote to memory of 1152 3016 2d859c225937f092cd7ded70b7668b979f0d3cb45264c0590f67717ad25f7175.exe 30 PID 3016 wrote to memory of 2060 3016 2d859c225937f092cd7ded70b7668b979f0d3cb45264c0590f67717ad25f7175.exe 31 PID 3016 wrote to memory of 2060 3016 2d859c225937f092cd7ded70b7668b979f0d3cb45264c0590f67717ad25f7175.exe 31 PID 3016 wrote to memory of 2060 3016 2d859c225937f092cd7ded70b7668b979f0d3cb45264c0590f67717ad25f7175.exe 31 PID 3016 wrote to memory of 2060 3016 2d859c225937f092cd7ded70b7668b979f0d3cb45264c0590f67717ad25f7175.exe 31 PID 2060 wrote to memory of 2980 2060 Logo1_.exe 33 PID 2060 wrote to memory of 2980 2060 Logo1_.exe 33 PID 2060 wrote to memory of 2980 2060 Logo1_.exe 33 PID 2060 wrote to memory of 2980 2060 Logo1_.exe 33 PID 2980 wrote to memory of 1076 2980 net.exe 35 PID 2980 wrote to memory of 1076 2980 net.exe 35 PID 2980 wrote to memory of 1076 2980 net.exe 35 PID 2980 wrote to memory of 1076 2980 net.exe 35 PID 1152 wrote to memory of 2260 1152 cmd.exe 36 PID 1152 wrote to memory of 2260 1152 cmd.exe 36 PID 1152 wrote to memory of 2260 1152 cmd.exe 36 PID 1152 wrote to memory of 2260 1152 cmd.exe 36 PID 2060 wrote to memory of 1380 2060 Logo1_.exe 21 PID 2060 wrote to memory of 1380 2060 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1380
-
C:\Users\Admin\AppData\Local\Temp\2d859c225937f092cd7ded70b7668b979f0d3cb45264c0590f67717ad25f7175.exe"C:\Users\Admin\AppData\Local\Temp\2d859c225937f092cd7ded70b7668b979f0d3cb45264c0590f67717ad25f7175.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aA63E.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\2d859c225937f092cd7ded70b7668b979f0d3cb45264c0590f67717ad25f7175.exe"C:\Users\Admin\AppData\Local\Temp\2d859c225937f092cd7ded70b7668b979f0d3cb45264c0590f67717ad25f7175.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2260
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:1076
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD593682ae617e5b6cca0eed1522c68a8be
SHA1c2e2a5a852ddffd60d93922c25d6c36152c01a11
SHA25658440fceb04e732a78fe83ce9ed85f7bc0b1db862430d3afaa3c03d0500b94b8
SHA51258c6421e32999513946aff532cb697374362f03e84231b0c3bda9539e9141308f4f92b44141ab1b0a6108efe4e26712ed1ce223218aa6dac2e114ef67b0c6117
-
Filesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
Filesize
722B
MD5b84d06e6b55640fbe556535eb0219f7a
SHA1b957ab70f84af8822998e6c7094333ce968e8e9b
SHA256d570cfe41783eaec13e0d176e2b52e27f130c785eaf97c35846dbbe8144ae9b9
SHA51266b97c5cfbc141d950dba15b46da48fd507e999edcf0ade80c7600c899dfe876707997fcd5cc4b4eec22e48cf48218023cff47b5baf89893cab769732295ce34
-
C:\Users\Admin\AppData\Local\Temp\2d859c225937f092cd7ded70b7668b979f0d3cb45264c0590f67717ad25f7175.exe.exe
Filesize881KB
MD5f047493ec3160cad60fa367f534ba1aa
SHA15e9f1afcc757149f54f6f509bce9f66d45d42b2b
SHA256f895a6b92606ca7de94e757a00d574551148e583285dee6959d0d7f1c7aa7126
SHA5120327605bcec48e81479f69ac8a3733ae1fc16932cfacc6c1672faae1c439e44f763613984834d4acec65c6d70017ea816448c45414b050fb46d664b1b5833d9d
-
Filesize
26KB
MD52f809e1bc24e065a06eb9cc885f52666
SHA15a3f1009a867e84081c8e510a95a6aa67d0ea4f7
SHA256449b2bf4a84e027375af2a6bbe59a0b18c07edfc9aa96c6ff52adfc195fcd739
SHA51225338b9c6561fce3574871b08ec6f5705ca78b74e22828efaed88fb51c2c3a92d6afcd96eabf273ab19678cde13af96ad6db22532e5750e4da6202adb314435c
-
Filesize
9B
MD547dd2aeea8b548cd2ed3e9a71bf04f02
SHA1fb4ab8a2ceb995fb0ad31326ce2f2aeb9eba5987
SHA256ceadd1f3f299b6a19ca4844eee791af719de61dbec0839b68ed0f1d6cb5c5411
SHA51245843cc926c9c267f3cc967859b7537e937367ab5280f1429cc2f80d7b536131c40238cdcd5a3fc9823521bc596994e79bd3f37d3cc8db8a329f739e0793c50e