Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 07:18
Static task
static1
Behavioral task
behavioral1
Sample
df47f2068248e243c5bfa0debaa97d6b5be4b47ad0c7adb00d06f270493fa5c3.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
df47f2068248e243c5bfa0debaa97d6b5be4b47ad0c7adb00d06f270493fa5c3.exe
Resource
win10v2004-20240802-en
General
-
Target
df47f2068248e243c5bfa0debaa97d6b5be4b47ad0c7adb00d06f270493fa5c3.exe
-
Size
56KB
-
MD5
2565a933c9f2dcd7157e6860263d00e2
-
SHA1
d6c06d875cc84b43aa4641d7a564232c61d077ef
-
SHA256
df47f2068248e243c5bfa0debaa97d6b5be4b47ad0c7adb00d06f270493fa5c3
-
SHA512
b0e59f6f68a4fca76545fa8361868ec05992f94878fa6de4a7ff64fd4ac104810b8aa431949a6e8165d72a6f5706e35140813ed22af0064031cf36859f8e8faf
-
SSDEEP
768:p4L16GVRu1yK9fMnJG2V9dHS8+L/QasvFEpYinAMxklal9qYi2lauAMxkEq:p4h3SHuJV9NqL/Uve7Hxaio7YZxG
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2376 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2716 Logo1_.exe 2740 df47f2068248e243c5bfa0debaa97d6b5be4b47ad0c7adb00d06f270493fa5c3.exe -
Loads dropped DLL 1 IoCs
pid Process 2376 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft.NET\RedistList\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fy\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\in_sidebar\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\ProjectTool\Project Report Type\Fancy\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\Africa\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\Acrobat\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Mahjong\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\QuickStyles\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\DW\DWTRIG20.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Triedit\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\de\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\Computers\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\VideoWall\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\Antarctica\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\skins\fonts\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Google\Update\Install\{8EA3FE23-8E0B-4836-8777-C2D6ED0590DC}\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSACCESS.EXE Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Web Server Extensions\14\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\Accessories\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Mac\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\SDK\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\LISTS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\STARTUP\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\AddInSideAdapters\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\dtplugin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\amd64\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Publisher.en-us\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TextConv\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\GrayCheck\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\html\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\he\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Journal\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\LogTransport2.exe Logo1_.exe File created C:\Program Files\Mozilla Firefox\defaults\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sm\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\en-US\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SKY\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VBA\VBA6\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Bibliography\Sort\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\PROOF\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Sync Framework\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Logo1_.exe df47f2068248e243c5bfa0debaa97d6b5be4b47ad0c7adb00d06f270493fa5c3.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe df47f2068248e243c5bfa0debaa97d6b5be4b47ad0c7adb00d06f270493fa5c3.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language df47f2068248e243c5bfa0debaa97d6b5be4b47ad0c7adb00d06f270493fa5c3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logo1_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language df47f2068248e243c5bfa0debaa97d6b5be4b47ad0c7adb00d06f270493fa5c3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2716 Logo1_.exe 2716 Logo1_.exe 2716 Logo1_.exe 2716 Logo1_.exe 2716 Logo1_.exe 2716 Logo1_.exe 2716 Logo1_.exe 2716 Logo1_.exe 2716 Logo1_.exe 2716 Logo1_.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2476 wrote to memory of 2376 2476 df47f2068248e243c5bfa0debaa97d6b5be4b47ad0c7adb00d06f270493fa5c3.exe 31 PID 2476 wrote to memory of 2376 2476 df47f2068248e243c5bfa0debaa97d6b5be4b47ad0c7adb00d06f270493fa5c3.exe 31 PID 2476 wrote to memory of 2376 2476 df47f2068248e243c5bfa0debaa97d6b5be4b47ad0c7adb00d06f270493fa5c3.exe 31 PID 2476 wrote to memory of 2376 2476 df47f2068248e243c5bfa0debaa97d6b5be4b47ad0c7adb00d06f270493fa5c3.exe 31 PID 2476 wrote to memory of 2716 2476 df47f2068248e243c5bfa0debaa97d6b5be4b47ad0c7adb00d06f270493fa5c3.exe 32 PID 2476 wrote to memory of 2716 2476 df47f2068248e243c5bfa0debaa97d6b5be4b47ad0c7adb00d06f270493fa5c3.exe 32 PID 2476 wrote to memory of 2716 2476 df47f2068248e243c5bfa0debaa97d6b5be4b47ad0c7adb00d06f270493fa5c3.exe 32 PID 2476 wrote to memory of 2716 2476 df47f2068248e243c5bfa0debaa97d6b5be4b47ad0c7adb00d06f270493fa5c3.exe 32 PID 2716 wrote to memory of 2736 2716 Logo1_.exe 34 PID 2716 wrote to memory of 2736 2716 Logo1_.exe 34 PID 2716 wrote to memory of 2736 2716 Logo1_.exe 34 PID 2716 wrote to memory of 2736 2716 Logo1_.exe 34 PID 2376 wrote to memory of 2740 2376 cmd.exe 35 PID 2376 wrote to memory of 2740 2376 cmd.exe 35 PID 2376 wrote to memory of 2740 2376 cmd.exe 35 PID 2376 wrote to memory of 2740 2376 cmd.exe 35 PID 2376 wrote to memory of 2740 2376 cmd.exe 35 PID 2376 wrote to memory of 2740 2376 cmd.exe 35 PID 2376 wrote to memory of 2740 2376 cmd.exe 35 PID 2736 wrote to memory of 2532 2736 net.exe 37 PID 2736 wrote to memory of 2532 2736 net.exe 37 PID 2736 wrote to memory of 2532 2736 net.exe 37 PID 2736 wrote to memory of 2532 2736 net.exe 37 PID 2716 wrote to memory of 1360 2716 Logo1_.exe 21 PID 2716 wrote to memory of 1360 2716 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1360
-
C:\Users\Admin\AppData\Local\Temp\df47f2068248e243c5bfa0debaa97d6b5be4b47ad0c7adb00d06f270493fa5c3.exe"C:\Users\Admin\AppData\Local\Temp\df47f2068248e243c5bfa0debaa97d6b5be4b47ad0c7adb00d06f270493fa5c3.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aF892.bat3⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\df47f2068248e243c5bfa0debaa97d6b5be4b47ad0c7adb00d06f270493fa5c3.exe"C:\Users\Admin\AppData\Local\Temp\df47f2068248e243c5bfa0debaa97d6b5be4b47ad0c7adb00d06f270493fa5c3.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2740
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:2532
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD59321380fe6fc781a717232be48efc4a8
SHA1d83a59fce89a59517700cd3b4c425dc82fd1edb8
SHA2564fe5b9527b45400d8540a2e10997d27042b573e45ac23b1ef3e512928c6defb6
SHA5125549db64303ab04bff844a8ad157a57c3c298c09871b74c3eb2caa6dcc1c859ff96c2b23deff2c5ca70ba688e17e1719780294d2baa5e9abbace19fad0429843
-
Filesize
474KB
MD5a3df96290a8e846cd9875eb80404f85d
SHA16cc49cf230cac2ccc1f90a54ec40a5a4b1f32ce4
SHA256332869a7b38c3725d9f888a10ddfb9bebc5820cab8882053454fa42430514c6d
SHA512eb8b9edbee01a67008d0c4128ee0cdbbcc54a9faf60c72c8cc3b26f497a11f1b5774812968ceb68ea46607a9b5e674ca2638d7368c2255cf584a9ef7c86553e6
-
Filesize
722B
MD5585af02b903f8541450667b0f9aef347
SHA1823e4fd18feb1124bbaba5e9b9418d719d8fb7d0
SHA256d8030fda0707ef31942a95148cd0fc94377fe394b99b8f03d38b4609b0fd4d0b
SHA512dbc837b0fdc3e09d642bf8734703bd558e53364ec7e904393ff524b53b34660501a5546a6bf1be61eb9948fe9cf58dce19889fa2e0add49986c71becc6a64c84
-
C:\Users\Admin\AppData\Local\Temp\df47f2068248e243c5bfa0debaa97d6b5be4b47ad0c7adb00d06f270493fa5c3.exe.exe
Filesize26KB
MD59e4d73e24d912baa6e20a98fa4f98df3
SHA1965fbbbaa4156dcb5c6391df4d245bbf94d62c0f
SHA25628c6ce3582292ca5df81b9f8996369e82d489cc894cba9ed6b3e6678e67fc7f1
SHA5120fc58e74c7a0773a6338c35656484f2e5682a55a9c6ca03bc479728c617afc99295a3dcb52d7d414d8f5cb9c37704886f54e26acf47a3d69ebb931ce2e3bd4f2
-
Filesize
29KB
MD580fb683ec1520da982b68ed12e571fd8
SHA1e6c98d2fb082b7f8c260463d7241dba097796b8e
SHA2569f4c161eaba3525f1e15ffb8a23799c4ce7f918a3ee3f97ee4d51e34b6aa30d0
SHA51212d3d4dcb7c1ae451376609e0e1d27649229a00b52e88b3fb6d920d994e792041e48cc0ad3107881af31b451b0396fef666b53c55a8708eeb647b69bd6f1b088
-
Filesize
9B
MD59810b812fea5407a7c6a6b912eab6de9
SHA1653710a103c34c6d87e85d547de48561b1579927
SHA256497dc92fb09ed6740a1e704ddf5f45daf1d330f0977aaf1142604be15753e7ef
SHA512a23126d1624a391a08931a8f98ec9c26bc5bbe75de0f111bcdbf17b5bbe9bc6e748ca58e52c96fb9ea80509d5ad1c90bf1d92e472b08b2532321106ba1aca2cd