Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
01/08/2024, 22:44
Static task
static1
Behavioral task
behavioral1
Sample
443edd4fc269c02a56b2b7e0c00c601c40b0cc211ea50b6c1d92837e4c4fb319.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
443edd4fc269c02a56b2b7e0c00c601c40b0cc211ea50b6c1d92837e4c4fb319.exe
Resource
win10v2004-20240730-en
General
-
Target
443edd4fc269c02a56b2b7e0c00c601c40b0cc211ea50b6c1d92837e4c4fb319.exe
-
Size
183KB
-
MD5
68b23c7a625878dc787c9a4c2b50dbc4
-
SHA1
716904640829aa71e3db077d32fda9f35d291d77
-
SHA256
443edd4fc269c02a56b2b7e0c00c601c40b0cc211ea50b6c1d92837e4c4fb319
-
SHA512
f0c9778c5fc1f559123e85f35cca16bf1f98ce9b12f1ef6b25ff97c0d732baf101a9b402b120b60bcbc0827b074f4b0be6ad93fa163c804b72a6752eb9784e40
-
SSDEEP
3072:bKftffjmNAwLEVbLoEZlKk7611VBzNkDqrB5bGEAd9/E3e7IFxt:bKVfjmNARuk7611VBzhEEu83n
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2556 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2396 Logo1_.exe 2196 443edd4fc269c02a56b2b7e0c00c601c40b0cc211ea50b6c1d92837e4c4fb319.exe -
Loads dropped DLL 1 IoCs
pid Process 2556 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\in_sidebar\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\tt\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\WORDICON.EXE Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ar\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\zh_CN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\bckgzm.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\eu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\eu\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Photo Viewer\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ms\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Kentucky\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\More Games\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\AXIS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Sounds\Places\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\he\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Excel.en-us\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\co\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\REFINED\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\jfr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Defender\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\1049\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateBroker.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\tnameserv.exe Logo1_.exe File created C:\Program Files\Windows Journal\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Swirl\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\cmm\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\1028\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Office.en-us\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\8.0\x86\vsta_ep32.exe Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1036\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\klist.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\reader_sl.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightOrange\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\el\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hy\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\km\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe AIR Application Installer.exe Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 443edd4fc269c02a56b2b7e0c00c601c40b0cc211ea50b6c1d92837e4c4fb319.exe File created C:\Windows\Logo1_.exe 443edd4fc269c02a56b2b7e0c00c601c40b0cc211ea50b6c1d92837e4c4fb319.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 443edd4fc269c02a56b2b7e0c00c601c40b0cc211ea50b6c1d92837e4c4fb319.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logo1_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2396 Logo1_.exe 2396 Logo1_.exe 2396 Logo1_.exe 2396 Logo1_.exe 2396 Logo1_.exe 2396 Logo1_.exe 2396 Logo1_.exe 2396 Logo1_.exe 2396 Logo1_.exe 2396 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2552 wrote to memory of 2556 2552 443edd4fc269c02a56b2b7e0c00c601c40b0cc211ea50b6c1d92837e4c4fb319.exe 30 PID 2552 wrote to memory of 2556 2552 443edd4fc269c02a56b2b7e0c00c601c40b0cc211ea50b6c1d92837e4c4fb319.exe 30 PID 2552 wrote to memory of 2556 2552 443edd4fc269c02a56b2b7e0c00c601c40b0cc211ea50b6c1d92837e4c4fb319.exe 30 PID 2552 wrote to memory of 2556 2552 443edd4fc269c02a56b2b7e0c00c601c40b0cc211ea50b6c1d92837e4c4fb319.exe 30 PID 2552 wrote to memory of 2396 2552 443edd4fc269c02a56b2b7e0c00c601c40b0cc211ea50b6c1d92837e4c4fb319.exe 31 PID 2552 wrote to memory of 2396 2552 443edd4fc269c02a56b2b7e0c00c601c40b0cc211ea50b6c1d92837e4c4fb319.exe 31 PID 2552 wrote to memory of 2396 2552 443edd4fc269c02a56b2b7e0c00c601c40b0cc211ea50b6c1d92837e4c4fb319.exe 31 PID 2552 wrote to memory of 2396 2552 443edd4fc269c02a56b2b7e0c00c601c40b0cc211ea50b6c1d92837e4c4fb319.exe 31 PID 2396 wrote to memory of 2408 2396 Logo1_.exe 33 PID 2396 wrote to memory of 2408 2396 Logo1_.exe 33 PID 2396 wrote to memory of 2408 2396 Logo1_.exe 33 PID 2396 wrote to memory of 2408 2396 Logo1_.exe 33 PID 2408 wrote to memory of 2812 2408 net.exe 35 PID 2408 wrote to memory of 2812 2408 net.exe 35 PID 2408 wrote to memory of 2812 2408 net.exe 35 PID 2408 wrote to memory of 2812 2408 net.exe 35 PID 2556 wrote to memory of 2196 2556 cmd.exe 36 PID 2556 wrote to memory of 2196 2556 cmd.exe 36 PID 2556 wrote to memory of 2196 2556 cmd.exe 36 PID 2556 wrote to memory of 2196 2556 cmd.exe 36 PID 2396 wrote to memory of 1212 2396 Logo1_.exe 21 PID 2396 wrote to memory of 1212 2396 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\443edd4fc269c02a56b2b7e0c00c601c40b0cc211ea50b6c1d92837e4c4fb319.exe"C:\Users\Admin\AppData\Local\Temp\443edd4fc269c02a56b2b7e0c00c601c40b0cc211ea50b6c1d92837e4c4fb319.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aD1FF.bat3⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\443edd4fc269c02a56b2b7e0c00c601c40b0cc211ea50b6c1d92837e4c4fb319.exe"C:\Users\Admin\AppData\Local\Temp\443edd4fc269c02a56b2b7e0c00c601c40b0cc211ea50b6c1d92837e4c4fb319.exe"4⤵
- Executes dropped EXE
PID:2196
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:2812
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD53c38b343d23eab2e5cc6ed8750662c3b
SHA13dcf797905c786d346497c2b8968c6856e843193
SHA256ee4eec41f7b49e2c8fa96044fcb4bb8ca9f6a1f73c1f1f5f10ef2523a35192c1
SHA512e1318550c57ade3ae0a8d597674472d91ad50a2bd97ae6d0a0f282cf43cdd6a6986e4cf76ad9b11e97dbecb10cb3ad9c03da3e5b8d02effd141eda3c189ec0e0
-
Filesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
Filesize
722B
MD56bf69189311060fe05535330de8b8cf3
SHA1dacd4379dd2cef9822bc1ec1f40c04bf6a14f62a
SHA25617a321417061df86ccdbfc68881de97ba7c42080ca75f30ed7cf7dc7e50f576a
SHA512cf4e16dd70f7730f01eb9c5ddc1000052a46827d7f0dd9610b8c7590f86f402a371aac12a738b12b59e531f58b83bee0671445afb3ceb95da4f4178ff73019ee
-
C:\Users\Admin\AppData\Local\Temp\443edd4fc269c02a56b2b7e0c00c601c40b0cc211ea50b6c1d92837e4c4fb319.exe.exe
Filesize156KB
MD5bc85df197807ca7bf4db6dc95d880eda
SHA1de6968c16941cd9e61bee24fb18597c775ef3e44
SHA25638284cf5dcb2fc6b523feb1f5f74988a264ab25ca86ab303f34ae3ac338e1879
SHA512f89ab64fa49702acb91d514f13921e53cf31dde007457f6dd3fd8ff02ef9a602802bf8742ebeab9ad6cc8a26c716de58294d5ca937921244fe9c671a0c17b256
-
Filesize
26KB
MD5013b3ba135ea23f5d8c21d3bca2be7af
SHA1ce56fde9f0f8aa0c28fd14ebe2e6c90b3f659993
SHA2565846917027617f7167fdf3f71d0aaefc2f66cdedd36b98c227b40d337af7cf69
SHA512f9e7c8b6db1cdb04b748420bc92ec1b3d543edbeddba1c7e321faefc3fa7275e2a12fd9566a3ba698453c14ac14a748f46e320b725e388028d79617238b94c05
-
Filesize
8B
MD534f94fcbc939d25f54e986fe97a87522
SHA1dcde2a11c5631b5dbd93ce97e503d0ff42a6f341
SHA25647f454cb045cab0f9ee28683942faddf984b88986cb761e4caa639f91ac4cdd7
SHA512aad5abbdc495f19e0997d67d3daad417eb18f3e3061de2515d3870cc6c2c417aef366de938c8c98d3b62b81ec44f5a16e1227118e28b4624c99b2c1546e1c678