Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
18/07/2024, 23:58
Static task
static1
Behavioral task
behavioral1
Sample
a886a373f1fa3134a8523f844dec7f875c5457ced6e05d2bc4ef41eed89325d7.exe
Resource
win7-20240705-en
General
-
Target
a886a373f1fa3134a8523f844dec7f875c5457ced6e05d2bc4ef41eed89325d7.exe
-
Size
5.7MB
-
MD5
840120c3e95a1d9d03161f07247c98ba
-
SHA1
49886f9fcf5f3ba5f1e38f5698064ceeafe93744
-
SHA256
a886a373f1fa3134a8523f844dec7f875c5457ced6e05d2bc4ef41eed89325d7
-
SHA512
8714ae37c9967031b072f046f1cfbe0491b90b06c0a7750acc727d4e858cf774ad0775a8976f5f0b293945c718fe0fadb8daa9623d6bcd7dd560e2ff7f724e84
-
SSDEEP
49152:fBr9Pv94AEsKU8ggw1g+1CART5eBiyKS3EI3wybn20DCYIHvc8ixuZm9+fWsw6dr:fzKUgTH2M2m9UMpu1QfLczqssnKSk
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2060 cmd.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe -
Executes dropped EXE 2 IoCs
pid Process 2540 Logo1_.exe 2872 a886a373f1fa3134a8523f844dec7f875c5457ced6e05d2bc4ef41eed89325d7.exe -
Loads dropped DLL 1 IoCs
pid Process 2060 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Windows Media Player\Visualizations\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\DW\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\Pacific\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\bn_IN\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ru\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sq\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Triedit\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bn\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\kab\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jarsigner.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javacpl.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\cache\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\en-US\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lg\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\access_output\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Triedit\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Mail\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Mail\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\appletviewer.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Shared Gadgets\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\Indian\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ca\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ku_IQ\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ro\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VGX\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ta\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Photo Viewer\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sv\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\reader_sl.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\HWRCustomization\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\org.eclipse.equinox.simpleconfigurator\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\en_GB\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\win\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Checkers\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ja\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\SubsetList\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\AppInfoDocument\Microsoft.VisualStudio.Tools.Office.AppInfoDocument\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe a886a373f1fa3134a8523f844dec7f875c5457ced6e05d2bc4ef41eed89325d7.exe File created C:\Windows\Logo1_.exe a886a373f1fa3134a8523f844dec7f875c5457ced6e05d2bc4ef41eed89325d7.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 2404 a886a373f1fa3134a8523f844dec7f875c5457ced6e05d2bc4ef41eed89325d7.exe 2404 a886a373f1fa3134a8523f844dec7f875c5457ced6e05d2bc4ef41eed89325d7.exe 2404 a886a373f1fa3134a8523f844dec7f875c5457ced6e05d2bc4ef41eed89325d7.exe 2404 a886a373f1fa3134a8523f844dec7f875c5457ced6e05d2bc4ef41eed89325d7.exe 2404 a886a373f1fa3134a8523f844dec7f875c5457ced6e05d2bc4ef41eed89325d7.exe 2404 a886a373f1fa3134a8523f844dec7f875c5457ced6e05d2bc4ef41eed89325d7.exe 2404 a886a373f1fa3134a8523f844dec7f875c5457ced6e05d2bc4ef41eed89325d7.exe 2404 a886a373f1fa3134a8523f844dec7f875c5457ced6e05d2bc4ef41eed89325d7.exe 2404 a886a373f1fa3134a8523f844dec7f875c5457ced6e05d2bc4ef41eed89325d7.exe 2404 a886a373f1fa3134a8523f844dec7f875c5457ced6e05d2bc4ef41eed89325d7.exe 2404 a886a373f1fa3134a8523f844dec7f875c5457ced6e05d2bc4ef41eed89325d7.exe 2404 a886a373f1fa3134a8523f844dec7f875c5457ced6e05d2bc4ef41eed89325d7.exe 2404 a886a373f1fa3134a8523f844dec7f875c5457ced6e05d2bc4ef41eed89325d7.exe 2540 Logo1_.exe 2540 Logo1_.exe 2540 Logo1_.exe 2540 Logo1_.exe 2540 Logo1_.exe 2540 Logo1_.exe 2540 Logo1_.exe 2540 Logo1_.exe 2540 Logo1_.exe 2540 Logo1_.exe 2540 Logo1_.exe 2540 Logo1_.exe 2540 Logo1_.exe 2540 Logo1_.exe 2540 Logo1_.exe 2540 Logo1_.exe 2540 Logo1_.exe 2540 Logo1_.exe 2540 Logo1_.exe 2540 Logo1_.exe 2540 Logo1_.exe 2540 Logo1_.exe 2540 Logo1_.exe 2540 Logo1_.exe 2540 Logo1_.exe 2540 Logo1_.exe 2540 Logo1_.exe 2540 Logo1_.exe 2540 Logo1_.exe 2540 Logo1_.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 2404 wrote to memory of 2108 2404 a886a373f1fa3134a8523f844dec7f875c5457ced6e05d2bc4ef41eed89325d7.exe 30 PID 2404 wrote to memory of 2108 2404 a886a373f1fa3134a8523f844dec7f875c5457ced6e05d2bc4ef41eed89325d7.exe 30 PID 2404 wrote to memory of 2108 2404 a886a373f1fa3134a8523f844dec7f875c5457ced6e05d2bc4ef41eed89325d7.exe 30 PID 2404 wrote to memory of 2108 2404 a886a373f1fa3134a8523f844dec7f875c5457ced6e05d2bc4ef41eed89325d7.exe 30 PID 2108 wrote to memory of 2568 2108 net.exe 32 PID 2108 wrote to memory of 2568 2108 net.exe 32 PID 2108 wrote to memory of 2568 2108 net.exe 32 PID 2108 wrote to memory of 2568 2108 net.exe 32 PID 2404 wrote to memory of 2060 2404 a886a373f1fa3134a8523f844dec7f875c5457ced6e05d2bc4ef41eed89325d7.exe 33 PID 2404 wrote to memory of 2060 2404 a886a373f1fa3134a8523f844dec7f875c5457ced6e05d2bc4ef41eed89325d7.exe 33 PID 2404 wrote to memory of 2060 2404 a886a373f1fa3134a8523f844dec7f875c5457ced6e05d2bc4ef41eed89325d7.exe 33 PID 2404 wrote to memory of 2060 2404 a886a373f1fa3134a8523f844dec7f875c5457ced6e05d2bc4ef41eed89325d7.exe 33 PID 2404 wrote to memory of 2540 2404 a886a373f1fa3134a8523f844dec7f875c5457ced6e05d2bc4ef41eed89325d7.exe 35 PID 2404 wrote to memory of 2540 2404 a886a373f1fa3134a8523f844dec7f875c5457ced6e05d2bc4ef41eed89325d7.exe 35 PID 2404 wrote to memory of 2540 2404 a886a373f1fa3134a8523f844dec7f875c5457ced6e05d2bc4ef41eed89325d7.exe 35 PID 2404 wrote to memory of 2540 2404 a886a373f1fa3134a8523f844dec7f875c5457ced6e05d2bc4ef41eed89325d7.exe 35 PID 2540 wrote to memory of 280 2540 Logo1_.exe 36 PID 2540 wrote to memory of 280 2540 Logo1_.exe 36 PID 2540 wrote to memory of 280 2540 Logo1_.exe 36 PID 2540 wrote to memory of 280 2540 Logo1_.exe 36 PID 280 wrote to memory of 1208 280 net.exe 38 PID 280 wrote to memory of 1208 280 net.exe 38 PID 280 wrote to memory of 1208 280 net.exe 38 PID 280 wrote to memory of 1208 280 net.exe 38 PID 2540 wrote to memory of 2788 2540 Logo1_.exe 41 PID 2540 wrote to memory of 2788 2540 Logo1_.exe 41 PID 2540 wrote to memory of 2788 2540 Logo1_.exe 41 PID 2540 wrote to memory of 2788 2540 Logo1_.exe 41 PID 2788 wrote to memory of 2768 2788 net.exe 43 PID 2788 wrote to memory of 2768 2788 net.exe 43 PID 2788 wrote to memory of 2768 2788 net.exe 43 PID 2788 wrote to memory of 2768 2788 net.exe 43 PID 2540 wrote to memory of 1264 2540 Logo1_.exe 21 PID 2540 wrote to memory of 1264 2540 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\a886a373f1fa3134a8523f844dec7f875c5457ced6e05d2bc4ef41eed89325d7.exe"C:\Users\Admin\AppData\Local\Temp\a886a373f1fa3134a8523f844dec7f875c5457ced6e05d2bc4ef41eed89325d7.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2568
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aD04A.bat3⤵
- Deletes itself
- Loads dropped DLL
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\a886a373f1fa3134a8523f844dec7f875c5457ced6e05d2bc4ef41eed89325d7.exe"C:\Users\Admin\AppData\Local\Temp\a886a373f1fa3134a8523f844dec7f875c5457ced6e05d2bc4ef41eed89325d7.exe"4⤵
- Executes dropped EXE
PID:2872
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:280 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:1208
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2768
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258KB
MD5e4a8dffb1688f53152e052e8321811e4
SHA1afb478fd6eae98c9cd5fed71f469dc00fa06899f
SHA2567b341aa6cfb3cd296e54dfef5257d8dd65004a1e3f01a9e490e7549773f38972
SHA51207cfa5015dcc635db3fc5369c0cb3eebaf9e0e682ff0e4c37a5ce0b24b847c1676b7d72219f21da323860c9324da1afb0a7ca857b399701adfd7cd702aa6be09
-
Filesize
478KB
MD54b2e4624e1d0db501f6baf562187677b
SHA148417cf94efc5c6e4d67cb645e5b5beff059090d
SHA256ac5b78c6a58c82a8c23aa8c99d0a3067920eed03960cfbfadd1a252e727e54e7
SHA5120c1f85f93635dc8814057eb3ebf1ff31995bbaeb0ff18125c88018f2deb71a78bbf7c28c5a6c9200e63c23b443f986c0d592afeb346ade823dc8bf97f394ec31
-
Filesize
722B
MD53e08b6e0eb09791919b15b6517403bac
SHA18a18fac73a1bc852546747141b49257284c6f7fb
SHA2561630ed16fc16259886afa2e0c384409df0475aa5d45a31a58b76e7c8c4f51a7a
SHA5129aa954b82850e79d1dc16d1fad68692cc6d7d618c9473d8d4d9bc359bf969ef2f564eddac764d7b11e855f4f5e78c4a04dd3406d063733f97326a8684abbce39
-
C:\Users\Admin\AppData\Local\Temp\a886a373f1fa3134a8523f844dec7f875c5457ced6e05d2bc4ef41eed89325d7.exe.exe
Filesize5.7MB
MD5ba18e99b3e17adb5b029eaebc457dd89
SHA1ec0458f3c00d35b323f08d4e1cc2e72899429c38
SHA256f5ee36de8edf9be2ac2752b219cfdcb7ca1677071b8e116cb876306e9f1b6628
SHA5121f41929e6f5b555b60c411c7810cbf14e3af26100df5ac4533ec3739a278c1b925687284660efb4868e3741305098e2737836229efc9fe46c97a6057c10e677c
-
Filesize
33KB
MD5f0bee728d69001dfc8f94f1c501fb542
SHA16a53cb88d18702029de1a890175fdba926ea05dd
SHA25692b8885950c738b7e6294548617878028237847623db09ceeed8f7607e94b5e5
SHA5125ad10cdf51b83995125a3d153b826ceaa4fe24e3841bfbf094a16f46a61b7b5153a66962d412c54f6f0129e059559ad8590ce4165b8d99592cef08fde692b26c
-
Filesize
9B
MD52d55518fd017e47e3d2fdb1499f0a0cb
SHA15e0e91cf08f4b70c94d582ee42471bf8ff44c6ff
SHA256d615830656bcceecc6fa1159903a379b6e729160ef16ceff51d5c27d2540e52d
SHA512d689aad66c472ce7380828a7363d8626c99dc7025828ccc8f69701e3659e176cf0aa50cfc69d4d813986d823a2075067195b35843f16c1144e6d74094916c2ee