Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
21/07/2024, 22:52
Static task
static1
Behavioral task
behavioral1
Sample
45aa4ca3a7d1a7581b1a57f410da318f5cd7f7c3245de154672b4a9e6b4b7393.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
45aa4ca3a7d1a7581b1a57f410da318f5cd7f7c3245de154672b4a9e6b4b7393.exe
Resource
win10v2004-20240709-en
General
-
Target
45aa4ca3a7d1a7581b1a57f410da318f5cd7f7c3245de154672b4a9e6b4b7393.exe
-
Size
88KB
-
MD5
872feeda0dd842b2faa66a7f0cba7a48
-
SHA1
a89b48f540510c7a6d88a5ec748bf27bdd69ee54
-
SHA256
45aa4ca3a7d1a7581b1a57f410da318f5cd7f7c3245de154672b4a9e6b4b7393
-
SHA512
dc42388860cdba80fd46ea920df924965fe72f0a804b2279fbe36ac9c8c9a3c7a94f9cb77a2f3afbab86a3b346d632a25dd2d1393345f4240bfb0ab4f3e5e6c8
-
SSDEEP
1536:pJ3SHuJV9Ntyapmebn4ddJZeY86iLflLJYEIs67rxo:pJkuJVL8LK4ddJMY86ipmns6S
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2864 Logo1_.exe 1308 45aa4ca3a7d1a7581b1a57f410da318f5cd7f7c3245de154672b4a9e6b4b7393.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Work\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\cs-cz\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\zh-cn\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\Dictionaries\en_CA\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\themes\dark\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\js\nls\de-de\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\ja-jp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\zh-cn\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\Pester\3.4.0\Snippets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\js\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.StorePurchaseApp_11811.1001.18.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-white\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\ro-ro\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\he-IL\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\app\dev\libs\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\zh-cn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\pl-pl\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\host\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ja\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\bg\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\de-DE\View3d\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hr\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\ko-KR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\@1x\themes\dark\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\RedistList\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\fr-fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateOnDemand.exe Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\Pester\3.4.0\Functions\Assertions\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pa\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\RTL\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\en-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\uk-ua\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\sk-sk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\hr-hr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\MSBuild\Microsoft\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\files\dev\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\he-il\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\th-TH\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.YourPhone_2019.430.2026.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Diagnostics\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\Microsoft.Xbox.SmartGlass.Controls\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\images\themes\dark\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\fr-ma\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\am\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_3.6.73.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\nl-nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\it-it\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\js\nls\es-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\cs-cz\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\it-it\_desktop.ini Logo1_.exe File created C:\Program Files\7-Zip\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\PaintStudio.View.exe Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\Retail\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\HoloAssets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\it-it\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\BHO\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Xbox.TCUI_1.23.28002.0_x64__8wekyb3d8bbwe\TCUI-Toolkit\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 45aa4ca3a7d1a7581b1a57f410da318f5cd7f7c3245de154672b4a9e6b4b7393.exe File created C:\Windows\Logo1_.exe 45aa4ca3a7d1a7581b1a57f410da318f5cd7f7c3245de154672b4a9e6b4b7393.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2864 Logo1_.exe 2864 Logo1_.exe 2864 Logo1_.exe 2864 Logo1_.exe 2864 Logo1_.exe 2864 Logo1_.exe 2864 Logo1_.exe 2864 Logo1_.exe 2864 Logo1_.exe 2864 Logo1_.exe 2864 Logo1_.exe 2864 Logo1_.exe 2864 Logo1_.exe 2864 Logo1_.exe 2864 Logo1_.exe 2864 Logo1_.exe 2864 Logo1_.exe 2864 Logo1_.exe 2864 Logo1_.exe 2864 Logo1_.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 4476 wrote to memory of 916 4476 45aa4ca3a7d1a7581b1a57f410da318f5cd7f7c3245de154672b4a9e6b4b7393.exe 84 PID 4476 wrote to memory of 916 4476 45aa4ca3a7d1a7581b1a57f410da318f5cd7f7c3245de154672b4a9e6b4b7393.exe 84 PID 4476 wrote to memory of 916 4476 45aa4ca3a7d1a7581b1a57f410da318f5cd7f7c3245de154672b4a9e6b4b7393.exe 84 PID 4476 wrote to memory of 2864 4476 45aa4ca3a7d1a7581b1a57f410da318f5cd7f7c3245de154672b4a9e6b4b7393.exe 85 PID 4476 wrote to memory of 2864 4476 45aa4ca3a7d1a7581b1a57f410da318f5cd7f7c3245de154672b4a9e6b4b7393.exe 85 PID 4476 wrote to memory of 2864 4476 45aa4ca3a7d1a7581b1a57f410da318f5cd7f7c3245de154672b4a9e6b4b7393.exe 85 PID 2864 wrote to memory of 1820 2864 Logo1_.exe 87 PID 2864 wrote to memory of 1820 2864 Logo1_.exe 87 PID 2864 wrote to memory of 1820 2864 Logo1_.exe 87 PID 1820 wrote to memory of 1636 1820 net.exe 89 PID 1820 wrote to memory of 1636 1820 net.exe 89 PID 1820 wrote to memory of 1636 1820 net.exe 89 PID 916 wrote to memory of 1308 916 cmd.exe 90 PID 916 wrote to memory of 1308 916 cmd.exe 90 PID 2864 wrote to memory of 3512 2864 Logo1_.exe 56 PID 2864 wrote to memory of 3512 2864 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3512
-
C:\Users\Admin\AppData\Local\Temp\45aa4ca3a7d1a7581b1a57f410da318f5cd7f7c3245de154672b4a9e6b4b7393.exe"C:\Users\Admin\AppData\Local\Temp\45aa4ca3a7d1a7581b1a57f410da318f5cd7f7c3245de154672b4a9e6b4b7393.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a9971.bat3⤵
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Users\Admin\AppData\Local\Temp\45aa4ca3a7d1a7581b1a57f410da318f5cd7f7c3245de154672b4a9e6b4b7393.exe"C:\Users\Admin\AppData\Local\Temp\45aa4ca3a7d1a7581b1a57f410da318f5cd7f7c3245de154672b4a9e6b4b7393.exe"4⤵
- Executes dropped EXE
PID:1308
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:1636
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
247KB
MD5c3590ef22083c7d27933ede7cce7de0d
SHA18baedc723d5ffb7265fa460da9d3e757fdde9b76
SHA256acbfe46f3407186af9f90a7ca7385f58ceb7bb731b8d63d0d5aad5a1881a3fd7
SHA512ca283485a9a7e273ce20a78c24dbbebf747797842159c684d956905b0a3f718d5d43b24d9cd0f019e0c557f1baed4f095a2ed1f98090d982baeabf9b780787c7
-
Filesize
573KB
MD55adf6669b309138bee37e7d1e2c7d075
SHA1483ba48f02bdfb2478b2438ad1181aa06f023c92
SHA2561ef59dc0fec7bf45019ea6ce003ee5d6d1c1293e5e0cbbf4bc57fb7e105930af
SHA51248330121a6118a46c080ec3e30b2f0659b5e055b418936b6ef0d5087396863f28df0a45ab3930328a39859bf1c68d137676ab548914047e70a1d471acd39a2b3
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize639KB
MD5dca0158a64fcf25bfe34506eda2dac14
SHA1e933db0d69b24db5d274463e8bb4ce9cc820c283
SHA256b83bd9c6b40b2367934dfed9e59b519b7e0d464a4b3472689c031ccb8198b2c2
SHA512714960a7a693237eca4bb977ec37f7f577acfbab982f670f9f14a41445d60fa46b29aa0adf4b032c48e376a5167a20a9b158ca923e6956154b28e86e8d5d439e
-
Filesize
722B
MD55b13b8db87b63810b3b79c71bbc0cb6a
SHA1a26bd98065788c3f18a7e8cf78c7520d5c3438a6
SHA256479c748cf85afeea229bab56f8683f921290e04aae2194fb637fa5463f2136b1
SHA512d03160105fbbefd8ae687d44da5c806509f201447e69f4901a2c6807e5ecf4943c077418ed69e37b8c15dda80fa8cbb253381a5bd519512f697b4b348c3ffb16
-
C:\Users\Admin\AppData\Local\Temp\45aa4ca3a7d1a7581b1a57f410da318f5cd7f7c3245de154672b4a9e6b4b7393.exe.exe
Filesize59KB
MD5dfc18f7068913dde25742b856788d7ca
SHA1cbaa23f782c2ddcd7c9ff024fd0b096952a2b387
SHA256ff4ac75c02247000da084de006c214d3dd3583867bd3533ba788e22734c7a2bf
SHA512d0c7ec1dae41a803325b51c12490c355ed779d297daa35247889950491e52427810132f0829fc7ffa3022f1a106f4e4ba78ed612223395313a6f267e9ab24945
-
Filesize
29KB
MD5968fbfebdf34cc885e51e8bcaa182f2e
SHA191df1a0b7046e2eaef764223f16a5c9dee88afdb
SHA2565f7bff7aecb05283cfb2d2c3675e507495f6e06200be3b0ab1e00f76f038a5ce
SHA51228dfdbc55a467a9ff5ce094532246c2ae748b9473fa80ae7485249f0d3493549970e16df948ebfcb080b3e3e15a6b605aa491cbd36d2537ba2c99140eefcf065
-
Filesize
9B
MD52efce5174bcf8d378a924333f75e26ad
SHA14fe6e1d729b55d42eb9d74aca11b36a94402de14
SHA25604ccb9bec2864153c72852867d8e65dca07eca4e5edcfb4beb62cb364dcd91fa
SHA51224684969632fb0562a3a7a5fec91d869d627730d8e9d83a2b17e326d7047e3fbff205eec207914e42ecd50fef68a212c19f3599ded271c00e66acc22f1f04c16