Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 22:02
Static task
static1
Behavioral task
behavioral1
Sample
32712a3036b8222afb45c622a22d4ca7264bd96f691569ab0a36b46a823acfc2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
32712a3036b8222afb45c622a22d4ca7264bd96f691569ab0a36b46a823acfc2.exe
Resource
win10v2004-20240802-en
General
-
Target
32712a3036b8222afb45c622a22d4ca7264bd96f691569ab0a36b46a823acfc2.exe
-
Size
258KB
-
MD5
006a3b66d21ee3a19400d563d741e05d
-
SHA1
fd8970cc55501c01cb65c845fe77dc65342d8c97
-
SHA256
32712a3036b8222afb45c622a22d4ca7264bd96f691569ab0a36b46a823acfc2
-
SHA512
9d398dd7a8754335f1cd5a5b4dfe42a5a81a131d473e21db04827d05f106e38826ade8257f54f554bca3c1c93c96a322950441d527273a876d1434d4bfa8ae88
-
SSDEEP
1536:jZ3SHmLKarIpYQILFkbeumIkA39xSZW175V7UZQJ0UjsWpcdVO4Mqg+aJRaCAd1L:jZkF3plLRkgUA1nQZwFGVO4Mqg+WDY
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1624 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1664 Logo1_.exe 2276 32712a3036b8222afb45c622a22d4ca7264bd96f691569ab0a36b46a823acfc2.exe -
Loads dropped DLL 1 IoCs
pid Process 1624 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\VideoLAN\VLC\locale\ko\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\8.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\tr\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Media Player\Visualizations\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Services\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\Verisign\Components\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\ja\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\te\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\SpiderSolitaire\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\cy\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\PMP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\SoftBlue\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BLENDS\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\_desktop.ini Logo1_.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Internet Explorer\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\Bin\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Photo Viewer\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jdb.exe Logo1_.exe File created C:\Program Files\Microsoft Games\Purble Place\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\include\win32\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\More Games\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\Contracts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Web Server Extensions\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\Bin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\ext\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ps\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Triedit\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Web Server Extensions\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Americana\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Sounds\People\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\resources\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64_1.1.200.v20141007-2033\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_extractor\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\co\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\jfr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 32712a3036b8222afb45c622a22d4ca7264bd96f691569ab0a36b46a823acfc2.exe File created C:\Windows\Logo1_.exe 32712a3036b8222afb45c622a22d4ca7264bd96f691569ab0a36b46a823acfc2.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32712a3036b8222afb45c622a22d4ca7264bd96f691569ab0a36b46a823acfc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32712a3036b8222afb45c622a22d4ca7264bd96f691569ab0a36b46a823acfc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1664 Logo1_.exe 1664 Logo1_.exe 1664 Logo1_.exe 1664 Logo1_.exe 1664 Logo1_.exe 1664 Logo1_.exe 1664 Logo1_.exe 1664 Logo1_.exe 1664 Logo1_.exe 1664 Logo1_.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2008 wrote to memory of 1624 2008 32712a3036b8222afb45c622a22d4ca7264bd96f691569ab0a36b46a823acfc2.exe 30 PID 2008 wrote to memory of 1624 2008 32712a3036b8222afb45c622a22d4ca7264bd96f691569ab0a36b46a823acfc2.exe 30 PID 2008 wrote to memory of 1624 2008 32712a3036b8222afb45c622a22d4ca7264bd96f691569ab0a36b46a823acfc2.exe 30 PID 2008 wrote to memory of 1624 2008 32712a3036b8222afb45c622a22d4ca7264bd96f691569ab0a36b46a823acfc2.exe 30 PID 2008 wrote to memory of 1664 2008 32712a3036b8222afb45c622a22d4ca7264bd96f691569ab0a36b46a823acfc2.exe 31 PID 2008 wrote to memory of 1664 2008 32712a3036b8222afb45c622a22d4ca7264bd96f691569ab0a36b46a823acfc2.exe 31 PID 2008 wrote to memory of 1664 2008 32712a3036b8222afb45c622a22d4ca7264bd96f691569ab0a36b46a823acfc2.exe 31 PID 2008 wrote to memory of 1664 2008 32712a3036b8222afb45c622a22d4ca7264bd96f691569ab0a36b46a823acfc2.exe 31 PID 1664 wrote to memory of 2224 1664 Logo1_.exe 33 PID 1664 wrote to memory of 2224 1664 Logo1_.exe 33 PID 1664 wrote to memory of 2224 1664 Logo1_.exe 33 PID 1664 wrote to memory of 2224 1664 Logo1_.exe 33 PID 2224 wrote to memory of 2488 2224 net.exe 35 PID 2224 wrote to memory of 2488 2224 net.exe 35 PID 2224 wrote to memory of 2488 2224 net.exe 35 PID 2224 wrote to memory of 2488 2224 net.exe 35 PID 1624 wrote to memory of 2276 1624 cmd.exe 36 PID 1624 wrote to memory of 2276 1624 cmd.exe 36 PID 1624 wrote to memory of 2276 1624 cmd.exe 36 PID 1624 wrote to memory of 2276 1624 cmd.exe 36 PID 1624 wrote to memory of 2276 1624 cmd.exe 36 PID 1624 wrote to memory of 2276 1624 cmd.exe 36 PID 1624 wrote to memory of 2276 1624 cmd.exe 36 PID 1664 wrote to memory of 1152 1664 Logo1_.exe 20 PID 1664 wrote to memory of 1152 1664 Logo1_.exe 20
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1152
-
C:\Users\Admin\AppData\Local\Temp\32712a3036b8222afb45c622a22d4ca7264bd96f691569ab0a36b46a823acfc2.exe"C:\Users\Admin\AppData\Local\Temp\32712a3036b8222afb45c622a22d4ca7264bd96f691569ab0a36b46a823acfc2.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a8102.bat3⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\32712a3036b8222afb45c622a22d4ca7264bd96f691569ab0a36b46a823acfc2.exe"C:\Users\Admin\AppData\Local\Temp\32712a3036b8222afb45c622a22d4ca7264bd96f691569ab0a36b46a823acfc2.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2276
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:2488
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
252KB
MD5a808ca996b14696d489c8113d27c8bf4
SHA13686daeb450d654c6abe586bedcad32e3253c5da
SHA2565297764ce75736b13a7a54a1b29ad86e9830cb809491069e0240081646f4970b
SHA51283c8d825956c23b11fc156d953dd1f91d009fe5b566ee3bdb9007d9788c4230b723a9aeae73b92d44cef8193c2a7f9d6d2d35d4d087e89954ad70a5a78a82523
-
Filesize
472KB
MD588eb1bca8c399bc3f46e99cdde2f047e
SHA155fafbceb011e1af2edced978686a90971bd95f2
SHA25642fd78c05bc240d4ded16ac974f17c336f6ae3a1814d548021c48a942cc30428
SHA512149d4de0c024e25a13a7bb17471e6f48391d4f26b1c8388672320eed1c255f84219ad7b72bbebc531ae558d5192dd4bb6d0dddd6c65a45300c8e8348a4fb3728
-
Filesize
722B
MD528097b7407afe08a40a48567241c5cfc
SHA13e9427fb83a653b91f81bf447041f052c3fe8d5c
SHA2561146a3116aed73d926089f7ec5976aa895d5bcc2cf1f93d186965082372c6de4
SHA512476c8965d77744c3d2bfccba9f9dfa6722564ed028d7c4dfbb3931553c344697b73cc151091e4d73163bd0ce04322fa0016080a8ec02e61062ce0906db217ef8
-
C:\Users\Admin\AppData\Local\Temp\32712a3036b8222afb45c622a22d4ca7264bd96f691569ab0a36b46a823acfc2.exe.exe
Filesize231KB
MD56f581a41167d2d484fcba20e6fc3c39a
SHA1d48de48d24101b9baaa24f674066577e38e6b75c
SHA2563eb8d53778eab9fb13b4c97aeab56e4bad2a6ea3748d342f22eaf4d7aa3185a7
SHA512e1177b6cea89445d58307b3327c78909adff225497f9abb8de571cdd114b547a8f515ec3ab038b583bf752a085b231f6329d6ca82fbe6be8a58cd97a1dbaf0f6
-
Filesize
27KB
MD59bbc3817237b1731d5dbe97befe25e6e
SHA1082ff1063b8b48172a4b728afc53cea1e8cf1c47
SHA256740805a91a84f106a413b5fb5a2b8de558091f6b852f07c9af44172467c6927a
SHA512815371ad32f7951aace75fb9a56c38d914cd50d66f8730f142687d383636f7dac45ddcaa071fe1deca10d0e3526fe6d9d0f2f474c9660e347787316780e16807
-
Filesize
9B
MD5475984718232cf008bb73666d834f1f4
SHA112f23c9301c222f599a279e02a811d274d0f4abc
SHA256a5b32591119f87eb3c8a00c0c39e26ea6d6414aa9887d85fcb4903e1c14921b5
SHA51280235dc2560b7991d79f9550cdeca6ac02c00cee6bf186f8f20d4ff3fbd7718be937b73ab768d71c4027e153557b08bbfd95ea88d2e0857a7c70cf1da6fa9937