Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22/07/2024, 23:12
Static task
static1
Behavioral task
behavioral1
Sample
3a70df57018badadda4deee047963884597ad22461d6ba526eb86d5c52d47706.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3a70df57018badadda4deee047963884597ad22461d6ba526eb86d5c52d47706.exe
Resource
win10v2004-20240709-en
General
-
Target
3a70df57018badadda4deee047963884597ad22461d6ba526eb86d5c52d47706.exe
-
Size
3.0MB
-
MD5
2df06080847c440edb9dca506b20a330
-
SHA1
9ef81f44bd467a33a14fb14cb47c6ff954765147
-
SHA256
3a70df57018badadda4deee047963884597ad22461d6ba526eb86d5c52d47706
-
SHA512
01eee6ed888321ad16a26f7ec910e13d1cb3836f1cd890394a5c970f44378eb3f9fa71c07198d0a8bdc7ce074f9b427c7884beeff2f9a6a31b065b7135b2ad91
-
SSDEEP
49152:K76IGwdA0g6CupcLp0pHwjOLaUIeJSBTbJeKPTSuN0oqhedGW96oNeD:1IGH6CupcLp0pHnFSNbJ3TSW0oaW9nNe
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3696 Logo1_.exe 2764 3a70df57018badadda4deee047963884597ad22461d6ba526eb86d5c52d47706.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\sv-se\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\nls\fr-fr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\ca-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\de-de\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Configuration\Registration\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\fr\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_2019.125.2243.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example3.Diagnostics\1.1.1\Diagnostics\Simple\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\ca-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\Dictionaries\en_GB\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\uk-UA\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\he-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\he-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\en-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\fi-fi\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_filter\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\pt-br\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\ru-ru\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\tr-tr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\Pipeline.v10.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\createdump.exe Logo1_.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\HxAccounts.exe Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\skins\fonts\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\plugins\selection-action-plugins\epdf\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\pl-pl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lv\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\uz\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\sk-sk\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Logos\Square44x44\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Multimedia\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\zh-tw\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example3.Diagnostics\1.1.1\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\libs\jquery.ui.touch-punch\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\fr-ma\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\sl-si\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Defender\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\te\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_neutral_~_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example3.Diagnostics\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\SubsetList\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre-1.8\lib\images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\de-de\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\images\themes\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\da-dk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\ca-es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\images\themes\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\dotnet\host\fxr\7.0.16\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\es-es\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ks_IN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\modules\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\he-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\he-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\uk-ua\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\pt-br\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 3a70df57018badadda4deee047963884597ad22461d6ba526eb86d5c52d47706.exe File created C:\Windows\Logo1_.exe 3a70df57018badadda4deee047963884597ad22461d6ba526eb86d5c52d47706.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 3696 Logo1_.exe 3696 Logo1_.exe 3696 Logo1_.exe 3696 Logo1_.exe 3696 Logo1_.exe 3696 Logo1_.exe 3696 Logo1_.exe 3696 Logo1_.exe 3696 Logo1_.exe 3696 Logo1_.exe 3696 Logo1_.exe 3696 Logo1_.exe 3696 Logo1_.exe 3696 Logo1_.exe 3696 Logo1_.exe 3696 Logo1_.exe 3696 Logo1_.exe 3696 Logo1_.exe 3696 Logo1_.exe 3696 Logo1_.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4416 wrote to memory of 3280 4416 3a70df57018badadda4deee047963884597ad22461d6ba526eb86d5c52d47706.exe 86 PID 4416 wrote to memory of 3280 4416 3a70df57018badadda4deee047963884597ad22461d6ba526eb86d5c52d47706.exe 86 PID 4416 wrote to memory of 3280 4416 3a70df57018badadda4deee047963884597ad22461d6ba526eb86d5c52d47706.exe 86 PID 4416 wrote to memory of 3696 4416 3a70df57018badadda4deee047963884597ad22461d6ba526eb86d5c52d47706.exe 87 PID 4416 wrote to memory of 3696 4416 3a70df57018badadda4deee047963884597ad22461d6ba526eb86d5c52d47706.exe 87 PID 4416 wrote to memory of 3696 4416 3a70df57018badadda4deee047963884597ad22461d6ba526eb86d5c52d47706.exe 87 PID 3696 wrote to memory of 2896 3696 Logo1_.exe 89 PID 3696 wrote to memory of 2896 3696 Logo1_.exe 89 PID 3696 wrote to memory of 2896 3696 Logo1_.exe 89 PID 2896 wrote to memory of 1524 2896 net.exe 91 PID 2896 wrote to memory of 1524 2896 net.exe 91 PID 2896 wrote to memory of 1524 2896 net.exe 91 PID 3280 wrote to memory of 2764 3280 cmd.exe 92 PID 3280 wrote to memory of 2764 3280 cmd.exe 92 PID 3280 wrote to memory of 2764 3280 cmd.exe 92 PID 3696 wrote to memory of 3508 3696 Logo1_.exe 56 PID 3696 wrote to memory of 3508 3696 Logo1_.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3508
-
C:\Users\Admin\AppData\Local\Temp\3a70df57018badadda4deee047963884597ad22461d6ba526eb86d5c52d47706.exe"C:\Users\Admin\AppData\Local\Temp\3a70df57018badadda4deee047963884597ad22461d6ba526eb86d5c52d47706.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a9CDC.bat3⤵
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Users\Admin\AppData\Local\Temp\3a70df57018badadda4deee047963884597ad22461d6ba526eb86d5c52d47706.exe"C:\Users\Admin\AppData\Local\Temp\3a70df57018badadda4deee047963884597ad22461d6ba526eb86d5c52d47706.exe"4⤵
- Executes dropped EXE
PID:2764
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:1524
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
244KB
MD586c431395f7a9682dbb3a9403349d55c
SHA10c164a4f0b5d2f6b840eb46f6963f49c6f749363
SHA256054f5874dd3032ea612bc8981fa45545387f7793450eb408d4307368fd1b4895
SHA51294c00ec6d392cf2f0cb80e0c50a2707ce555fdd638eb263ba9214158de62d66d90971aa833e05b55639ba9b7a484fae412dc7de904ac06831d35dde6149d1180
-
Filesize
570KB
MD53de8be3db894d7c6864dd2f4ea2ccc38
SHA1ae0618c70156191f38c0b2e65a733f5534acc6c2
SHA25638484084c919c4f70a099da3595ae9749706e040981b03deab6bf57c21176af3
SHA5120249ba7e2de03a371b9b4016f16a77a6ad598170dd5384d7f88e11f798a9884dcaf581ad0764f1d9d9c6d2a556804708267d526372c025078ef79947ccaa1622
-
C:\ProgramData\Package Cache\{63880b41-04fc-4f9b-92c4-4455c255eb8c}\windowsdesktop-runtime-8.0.2-win-x64.exe
Filesize636KB
MD52500f702e2b9632127c14e4eaae5d424
SHA18726fef12958265214eeb58001c995629834b13a
SHA25682e5b0001f025ca3b8409c98e4fb06c119c68de1e4ef60a156360cb4ef61d19c
SHA512f420c62fa1f6897f51dd7a0f0e910fb54ad14d51973a2d4840eeea0448c860bf83493fb1c07be65f731efc39e19f8a99886c8cfd058cee482fe52d255a33a55c
-
Filesize
722B
MD57b623ad85c8c2431c0131fc1fbfc9cc4
SHA1703fd859123d07b3600ba95780323bd4632db1ea
SHA256e61fdb086fdb94529201f329ed735f6c965bb220cad4688b014b3016c7612ed6
SHA5126b53d0e565c298658de8f733feaa251833a48cec386c9228b0949cc5b2a237d463e762a66ee3cc35c596eec40b50e0e671a821414e140c753211db610b958bad
-
C:\Users\Admin\AppData\Local\Temp\3a70df57018badadda4deee047963884597ad22461d6ba526eb86d5c52d47706.exe.exe
Filesize3.0MB
MD5d9d63c77ed65a20c102e7a1a0df2b581
SHA18483bfba9e325a2c3e555bae3155e5d0e9ddcc9f
SHA256c96c258af32735e1f37f64b38a5f00e6618a574e48525be1b18c3eb60f79b17d
SHA5125fec2c4775bcb3615f16cd418512c873c8938d2235fd4ea40788f40327a2c8844c8c13e46aca43d85a7ada67aee299f430b49654779b44b7e0c8ead03ff7e4f3
-
Filesize
26KB
MD566b52612270a69c70fcb753c71db38af
SHA156c10089c0cc6d1638ec3a9818411040c0684cf0
SHA256bdcf0b120cbba26c70240bec100cf50964765bdbba76565d3d1ecc788ffded64
SHA5129be0b6f733a1e03626ad978b057405bd894e9f8179f5292e2ae62b1e2ee337e501233f58f75bf5643e12fdb68e6e6d2a3e146ba6641a448c089cd2e153d729e8
-
Filesize
9B
MD55e286801abdc6ca5d3091665a72ecd7c
SHA187e0b4601ab0b05784a1059a45d72d807b0e2cbb
SHA256131ccc46b756e5373dc2f2d37625bfb980a48f2f2287585da364166cf2e709b5
SHA51251506d6adb68cca9e21fcddfe9672b91352cdb4f3c5b8c2da40219c73d2e7724776cd8701ff68449720c0aa398fe4f7665dabae2bd5147d42c5b6882c99f0bf1