Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 09:06
Static task
static1
Behavioral task
behavioral1
Sample
ae8a6324bc182c423085ccaf624264f0N.exe
Resource
win7-20240704-en
General
-
Target
ae8a6324bc182c423085ccaf624264f0N.exe
-
Size
153KB
-
MD5
ae8a6324bc182c423085ccaf624264f0
-
SHA1
20b6d4285017c2e601dc3be2c29256a948f4ba70
-
SHA256
1d1989cb7940ef0718ed7b23379e321a840df9262c121b44327d595e42f6a48d
-
SHA512
722f0d465d0dbbec276cac795a79de0b5056ab812e55b1004374af48a331dc3c3ab532010e3bd5e7e624b5a029a9d0bf5f92b43063ffb38ad28b6dd7825ebbc0
-
SSDEEP
1536:Hsae+Zk7qzUJBeLkbiT29dXoT/igXrotyFD+ljb6e2s82qjUbb5d6ojOepel5:Hsae+aezUDbHX4rFob8LjUbb5d6u6
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2816 cmd.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe -
Executes dropped EXE 2 IoCs
pid Process 2300 Logo1_.exe 2788 ae8a6324bc182c423085ccaf624264f0N.exe -
Loads dropped DLL 2 IoCs
pid Process 2816 cmd.exe 2816 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Games\More Games\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\120DPI\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\win\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Media Player\Network Sharing\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\db\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Media Player\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\3082\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TextConv\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\Etc\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\SpiderSolitaire\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\mux\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Eula.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.core_5.5.0.165303\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\security\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\my\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ru\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\kinit.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\id\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Web Server Extensions\14\BIN\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\server\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\core\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\cgg\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Photo Viewer\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\FREN\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\ext\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\as_IN\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\uk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\wsimport.exe Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\ARFR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\ESEN\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\Atlantic\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\am\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\cy\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\kk\LC_MESSAGES\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe ae8a6324bc182c423085ccaf624264f0N.exe File created C:\Windows\Logo1_.exe ae8a6324bc182c423085ccaf624264f0N.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ae8a6324bc182c423085ccaf624264f0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ae8a6324bc182c423085ccaf624264f0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logo1_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 2488 ae8a6324bc182c423085ccaf624264f0N.exe 2488 ae8a6324bc182c423085ccaf624264f0N.exe 2488 ae8a6324bc182c423085ccaf624264f0N.exe 2488 ae8a6324bc182c423085ccaf624264f0N.exe 2488 ae8a6324bc182c423085ccaf624264f0N.exe 2488 ae8a6324bc182c423085ccaf624264f0N.exe 2488 ae8a6324bc182c423085ccaf624264f0N.exe 2488 ae8a6324bc182c423085ccaf624264f0N.exe 2488 ae8a6324bc182c423085ccaf624264f0N.exe 2488 ae8a6324bc182c423085ccaf624264f0N.exe 2488 ae8a6324bc182c423085ccaf624264f0N.exe 2488 ae8a6324bc182c423085ccaf624264f0N.exe 2488 ae8a6324bc182c423085ccaf624264f0N.exe 2300 Logo1_.exe 2300 Logo1_.exe 2300 Logo1_.exe 2300 Logo1_.exe 2300 Logo1_.exe 2300 Logo1_.exe 2300 Logo1_.exe 2300 Logo1_.exe 2300 Logo1_.exe 2300 Logo1_.exe 2300 Logo1_.exe 2300 Logo1_.exe 2300 Logo1_.exe 2300 Logo1_.exe 2300 Logo1_.exe 2300 Logo1_.exe 2300 Logo1_.exe 2300 Logo1_.exe 2300 Logo1_.exe 2300 Logo1_.exe 2300 Logo1_.exe 2300 Logo1_.exe 2300 Logo1_.exe 2300 Logo1_.exe 2300 Logo1_.exe 2300 Logo1_.exe 2300 Logo1_.exe 2300 Logo1_.exe 2300 Logo1_.exe 2300 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2488 wrote to memory of 1120 2488 ae8a6324bc182c423085ccaf624264f0N.exe 29 PID 2488 wrote to memory of 1120 2488 ae8a6324bc182c423085ccaf624264f0N.exe 29 PID 2488 wrote to memory of 1120 2488 ae8a6324bc182c423085ccaf624264f0N.exe 29 PID 2488 wrote to memory of 1120 2488 ae8a6324bc182c423085ccaf624264f0N.exe 29 PID 1120 wrote to memory of 664 1120 net.exe 31 PID 1120 wrote to memory of 664 1120 net.exe 31 PID 1120 wrote to memory of 664 1120 net.exe 31 PID 1120 wrote to memory of 664 1120 net.exe 31 PID 2488 wrote to memory of 2816 2488 ae8a6324bc182c423085ccaf624264f0N.exe 32 PID 2488 wrote to memory of 2816 2488 ae8a6324bc182c423085ccaf624264f0N.exe 32 PID 2488 wrote to memory of 2816 2488 ae8a6324bc182c423085ccaf624264f0N.exe 32 PID 2488 wrote to memory of 2816 2488 ae8a6324bc182c423085ccaf624264f0N.exe 32 PID 2488 wrote to memory of 2300 2488 ae8a6324bc182c423085ccaf624264f0N.exe 34 PID 2488 wrote to memory of 2300 2488 ae8a6324bc182c423085ccaf624264f0N.exe 34 PID 2488 wrote to memory of 2300 2488 ae8a6324bc182c423085ccaf624264f0N.exe 34 PID 2488 wrote to memory of 2300 2488 ae8a6324bc182c423085ccaf624264f0N.exe 34 PID 2300 wrote to memory of 2852 2300 Logo1_.exe 35 PID 2300 wrote to memory of 2852 2300 Logo1_.exe 35 PID 2300 wrote to memory of 2852 2300 Logo1_.exe 35 PID 2300 wrote to memory of 2852 2300 Logo1_.exe 35 PID 2852 wrote to memory of 2996 2852 net.exe 37 PID 2852 wrote to memory of 2996 2852 net.exe 37 PID 2852 wrote to memory of 2996 2852 net.exe 37 PID 2852 wrote to memory of 2996 2852 net.exe 37 PID 2816 wrote to memory of 2788 2816 cmd.exe 38 PID 2816 wrote to memory of 2788 2816 cmd.exe 38 PID 2816 wrote to memory of 2788 2816 cmd.exe 38 PID 2816 wrote to memory of 2788 2816 cmd.exe 38 PID 2300 wrote to memory of 2732 2300 Logo1_.exe 39 PID 2300 wrote to memory of 2732 2300 Logo1_.exe 39 PID 2300 wrote to memory of 2732 2300 Logo1_.exe 39 PID 2300 wrote to memory of 2732 2300 Logo1_.exe 39 PID 2732 wrote to memory of 2828 2732 net.exe 41 PID 2732 wrote to memory of 2828 2732 net.exe 41 PID 2732 wrote to memory of 2828 2732 net.exe 41 PID 2732 wrote to memory of 2828 2732 net.exe 41 PID 2300 wrote to memory of 1392 2300 Logo1_.exe 20 PID 2300 wrote to memory of 1392 2300 Logo1_.exe 20
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\ae8a6324bc182c423085ccaf624264f0N.exe"C:\Users\Admin\AppData\Local\Temp\ae8a6324bc182c423085ccaf624264f0N.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
PID:664
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aF90E.bat3⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\ae8a6324bc182c423085ccaf624264f0N.exe"C:\Users\Admin\AppData\Local\Temp\ae8a6324bc182c423085ccaf624264f0N.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2788
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:2996
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:2828
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD56d0d6e0e6b9c1f755eeee10305f199c9
SHA16bd5ffb0481f75d5edbb659dfc0c85f3fd1c9147
SHA256fd93ab2b7dca5b0b769637aeec591fe865efa180d2f46625c80153dcb1ccfa6d
SHA512eb15d0f478723e397ce4ca3ac36d6ee30066dd1139f5828efc1016db7a6e5632ab99dd72146091d0dd42409d5497619250ea718fccf3a9debf9ceed3a34d74b3
-
Filesize
484KB
MD57b714d463f7db900d5b6e757778a8ab8
SHA12cfc0e9f54236af8e10b0bfa551d87a20982b733
SHA256c995370836939a29853611830ca08d437286d4f45603edce88f36aa1f99a0d97
SHA512e8fe8823b5b7f282c24c964cbf4f248b7562259a13410bf95997288727f9bfc6ea51c4aa40182b649a2235bafc02062e0c57f4f62876b5174395071a8d68f9bb
-
Filesize
536B
MD54c6a21d8c95fbf17607dcff658f67fe6
SHA10647bbd685d1213a7ddbcd67995ce52ed8ca2c14
SHA25617d682b5b9496da51ec8e25f9515dd7f5a87f270dc5d3852b54d93f4bae9e9f2
SHA512cddf7dbb831a540aa5bc8c064af5e49d3e213d5891875004f4ee6164453a45c233c6596ed24682796cc3d27ca17c740bcdcc9b4d0e98121f46cc9ae4f3c987d7
-
Filesize
113KB
MD5095dabb90bb0953800131fbcc6f6df5e
SHA19166e25e1fe27c3f92e642ec2fcc36e7c3b19216
SHA25672f1979b588357e1b0dc3e6e9f9a368d2742f18bf1daab0ee94f26d6811f8a33
SHA512041a008d96140a46aa89776fd11e64064b9cda9bd551747f59ae98ccfdff07af010061338655d4d07925f4e2a6c9fc3c79159cec2c9e055445f4b2ab1275152f
-
Filesize
39KB
MD5dd45e175b084f3e7b3923cb8fcb3833b
SHA1e44896aa2e3e4a8ba6677fd10c4eac8315b3939c
SHA256cff2b960d67366aedaec8aaa4388a3537000a7253a3eeef378d24e1a171a4f13
SHA512562284581292c3965df7e1f95bcffa2047d9a9e42e863e32b9cfc7b289270db24ca1ecb004f26d499d9901c49c11844cf3868b93b4b704f30a98ba4b52824fba
-
Filesize
9B
MD5c20162cff0e529974834e150d7e6691f
SHA1512e9821581354bd8078227ddf386b17e771ff38
SHA25682f2070eb6138ab12ec2a1f0c3ca7b3b97db75cc19a5076ed382b017f309bdd6
SHA512c2c414232ac5fc3d7ff195523c49610795d0ea4d95c69748ef9ddd4a42203ace52a7da8594cb20102743a21b6eb5bd9e7ee5915513a9c11a0db319323538d744