Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 18:55
Static task
static1
Behavioral task
behavioral1
Sample
0b66585a6dc50183a59eb5f1910926af69e14d3234812983001948c9513fc1b5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0b66585a6dc50183a59eb5f1910926af69e14d3234812983001948c9513fc1b5.exe
Resource
win10v2004-20240802-en
General
-
Target
0b66585a6dc50183a59eb5f1910926af69e14d3234812983001948c9513fc1b5.exe
-
Size
9.3MB
-
MD5
d3cab54df1727c177908bbd442b63be4
-
SHA1
a3b71510e5547f90ebf6cf595618edbd6bc3d525
-
SHA256
0b66585a6dc50183a59eb5f1910926af69e14d3234812983001948c9513fc1b5
-
SHA512
703be1552aff54d8eaf61ca3913f9b87780bef6be45054886fc0bf05341a5ff597c137e822f183dcbe07017eb664105bebaa34147f815b87a2ca815f5b963540
-
SSDEEP
98304:IxfZeZiONXe0cK7jfI60f8BYNg3kQVLPXnmGLH376+MyUXnby:INZekOte0cifXmZNg0ILPXnmGDm3
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2572 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2892 Logo1_.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\ARFR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Chess\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_filter\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\TableTextService\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\et\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Publisher.en-us\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Web Server Extensions\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\SystemV\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\resources\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\uk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\Offline\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\1033\License Agreements\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ne\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mn\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Sync Framework\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\be\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ka\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\_desktop.ini Logo1_.exe File created C:\Program Files\Uninstall Information\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp.ja_5.5.0.165303\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\et\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\xjc.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\skins\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\lt\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\1.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BLENDS\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\DEEPBLUE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Triedit\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\misc\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Defender\en-US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Adobe\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\QuickStyles\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\Packages\Debugger\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Defender\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\mip.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\jdk15\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Esl\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\bn\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\SpeechEngines\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\DVD Maker\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\bs\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\de\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Logo1_.exe 0b66585a6dc50183a59eb5f1910926af69e14d3234812983001948c9513fc1b5.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 0b66585a6dc50183a59eb5f1910926af69e14d3234812983001948c9513fc1b5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0b66585a6dc50183a59eb5f1910926af69e14d3234812983001948c9513fc1b5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logo1_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2892 Logo1_.exe 2892 Logo1_.exe 2892 Logo1_.exe 2892 Logo1_.exe 2892 Logo1_.exe 2892 Logo1_.exe 2892 Logo1_.exe 2892 Logo1_.exe 2892 Logo1_.exe 2892 Logo1_.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2452 wrote to memory of 2572 2452 0b66585a6dc50183a59eb5f1910926af69e14d3234812983001948c9513fc1b5.exe 30 PID 2452 wrote to memory of 2572 2452 0b66585a6dc50183a59eb5f1910926af69e14d3234812983001948c9513fc1b5.exe 30 PID 2452 wrote to memory of 2572 2452 0b66585a6dc50183a59eb5f1910926af69e14d3234812983001948c9513fc1b5.exe 30 PID 2452 wrote to memory of 2572 2452 0b66585a6dc50183a59eb5f1910926af69e14d3234812983001948c9513fc1b5.exe 30 PID 2452 wrote to memory of 2892 2452 0b66585a6dc50183a59eb5f1910926af69e14d3234812983001948c9513fc1b5.exe 32 PID 2452 wrote to memory of 2892 2452 0b66585a6dc50183a59eb5f1910926af69e14d3234812983001948c9513fc1b5.exe 32 PID 2452 wrote to memory of 2892 2452 0b66585a6dc50183a59eb5f1910926af69e14d3234812983001948c9513fc1b5.exe 32 PID 2452 wrote to memory of 2892 2452 0b66585a6dc50183a59eb5f1910926af69e14d3234812983001948c9513fc1b5.exe 32 PID 2892 wrote to memory of 336 2892 Logo1_.exe 33 PID 2892 wrote to memory of 336 2892 Logo1_.exe 33 PID 2892 wrote to memory of 336 2892 Logo1_.exe 33 PID 2892 wrote to memory of 336 2892 Logo1_.exe 33 PID 336 wrote to memory of 1564 336 net.exe 35 PID 336 wrote to memory of 1564 336 net.exe 35 PID 336 wrote to memory of 1564 336 net.exe 35 PID 336 wrote to memory of 1564 336 net.exe 35 PID 2892 wrote to memory of 1180 2892 Logo1_.exe 21 PID 2892 wrote to memory of 1180 2892 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1180
-
C:\Users\Admin\AppData\Local\Temp\0b66585a6dc50183a59eb5f1910926af69e14d3234812983001948c9513fc1b5.exe"C:\Users\Admin\AppData\Local\Temp\0b66585a6dc50183a59eb5f1910926af69e14d3234812983001948c9513fc1b5.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aBE6F.bat3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2572
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:336 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:1564
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD504fd07e468e40a1a44fe6c15958d8022
SHA11e92dd9e4b7f16f8764439b02202d64198906905
SHA256c067048ee526b0d90a06335e08f6e0836a255de78d133f1ed592a6c409445786
SHA5122661435b45ea8b929e3215f91918cd5e1a144a6563a625016d2a734870825644c4ea90083f51e35e74df1538d7e22bd4b6c5d2af4c9df8a897e969336a8dd9c1
-
Filesize
474KB
MD5c14a5111b798cff20d7d66b0e035d409
SHA129f0894552b30815fed6ad231b5721e876869552
SHA256fd6f57dc1b82f6301cbecbf9db5728a9a69b10e3edbf4f8a1dfef571c77a6cb6
SHA512a4d8b74216c76fa3d48ab7300452725602bc6d5bcc0e6c23d458d65362cd24751f23755180ae69633090b172e95f18f225c0cb4a71dd1e050d8b3dff466e7f1b
-
Filesize
722B
MD5a4ec1a137e3dfd2e2b6a458c4a029281
SHA14fbb5d8dbe67d13237fc1bf676eaf75a5ebf1616
SHA256d8d30111a7d1a53148f5e37bf06a3fefdb8a7093d890d71424bfa77f64ac3eb7
SHA512d71f3a5c05618c6e15e0300fbb61316b21353f9476c8579212ef29a92fb10abd47617eb2b4e61466d611650bbb66f9a39aec900ea58c53b86293b5c93526fdf9
-
C:\Users\Admin\AppData\Local\Temp\0b66585a6dc50183a59eb5f1910926af69e14d3234812983001948c9513fc1b5.exe.exe
Filesize9.3MB
MD5b86f86ef5c09df3336638ad99b7c0c0f
SHA10428ad68c4dd86cebf917582d9de21ad2bdac97f
SHA2563ef229a273ff767f0dbc891329fa906455e8f696beb5b6611efe9d6f657d7ced
SHA512cd3ef6725bbc15c2090f3eee10af01766030a428ec39e8dab8f0174961e9aaef1a573fdbba3f7db0e251c5888a83b701cfab8055b28c30474405c2b00e826f97
-
Filesize
29KB
MD5ca4a7862478fb4f3b45a9e5d76664163
SHA13af635e45dca388b8575fc87ceb0c0e3607edfd1
SHA256c58b63edba763641f3aade2039f2297ad2a94a56d155de78f562b40afd215e0f
SHA512099fa71c1b45b4e85cf39bc16fb9436efcfeb954ce2a42bd4f3b9c94a30bde50a1d2d376dbebe941f08061f1c506fc6819b499ea52f7abd55de455be3f25322f
-
Filesize
9B
MD5f74f4ac317419affe59fa4d389dd7e7c
SHA1010f494382d5a64298702fe3732c9b96f438c653
SHA25674fafb0f14fb17a8a4963d5f46fc50b3517e7aa13414ac5f42edfdf212a9bb01
SHA512f82fea1632b97d2b6771f43a6941c84d7fbb86f4c4f69e9b4335aa0e166e2670f09d451da61b13cb16994b9294e99b1cfa27f2447579645b3886b7bd014cc00f