Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 18:01
Static task
static1
Behavioral task
behavioral1
Sample
88dac7348311960b99e3bc957b60bd0dd69918dc10b29c2bfb8165598a409043.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
88dac7348311960b99e3bc957b60bd0dd69918dc10b29c2bfb8165598a409043.exe
Resource
win10v2004-20240802-en
General
-
Target
88dac7348311960b99e3bc957b60bd0dd69918dc10b29c2bfb8165598a409043.exe
-
Size
662KB
-
MD5
d3636521f0f525ed88f067d7849e253c
-
SHA1
789f2e146a56831644746fe5fc4bd167fcb0a45d
-
SHA256
88dac7348311960b99e3bc957b60bd0dd69918dc10b29c2bfb8165598a409043
-
SHA512
71266e45df533732514ef54fb83cd957baef9ca71180ec379f3b2764239255f4ac152aebdae1fed7892f1af225f08db6f8081afbfb55343d0819354f29ee2dd9
-
SSDEEP
6144:duJpC9LRU0ySj14WH+JPb7uL8zRMnJjNhAp7SO8zRMnJjNhAp7S8FRcdEKFVAh7f:RPFlTz
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2752 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2772 Logo1_.exe 2876 88dac7348311960b99e3bc957b60bd0dd69918dc10b29c2bfb8165598a409043.exe -
Loads dropped DLL 1 IoCs
pid Process 2752 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Java\jdk1.7.0_80\jre\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\policytool.exe Logo1_.exe File created C:\Program Files\Windows Photo Viewer\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\2052\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\3082\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\km\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ie\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\ESEN\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VBA\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\GrayCheck\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BLUECALM\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows NT\TableTextService\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\css\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\Help\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe AIR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\MEIPreload\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lt\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Library\SOLVER\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fr\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\fur\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Atlantic\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\audio_output\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\FRAR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Mail\WinMail.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ach\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ff\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\security\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\9.0\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Library\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\schema\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sw\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\js\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Document Parts\1033\14\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\dark\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ks_IN\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\jfr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\bin\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\es-ES\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\prc\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\css\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 88dac7348311960b99e3bc957b60bd0dd69918dc10b29c2bfb8165598a409043.exe File created C:\Windows\Logo1_.exe 88dac7348311960b99e3bc957b60bd0dd69918dc10b29c2bfb8165598a409043.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 88dac7348311960b99e3bc957b60bd0dd69918dc10b29c2bfb8165598a409043.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logo1_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2772 Logo1_.exe 2772 Logo1_.exe 2772 Logo1_.exe 2772 Logo1_.exe 2772 Logo1_.exe 2772 Logo1_.exe 2772 Logo1_.exe 2772 Logo1_.exe 2772 Logo1_.exe 2772 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2752 2252 88dac7348311960b99e3bc957b60bd0dd69918dc10b29c2bfb8165598a409043.exe 30 PID 2252 wrote to memory of 2752 2252 88dac7348311960b99e3bc957b60bd0dd69918dc10b29c2bfb8165598a409043.exe 30 PID 2252 wrote to memory of 2752 2252 88dac7348311960b99e3bc957b60bd0dd69918dc10b29c2bfb8165598a409043.exe 30 PID 2252 wrote to memory of 2752 2252 88dac7348311960b99e3bc957b60bd0dd69918dc10b29c2bfb8165598a409043.exe 30 PID 2252 wrote to memory of 2772 2252 88dac7348311960b99e3bc957b60bd0dd69918dc10b29c2bfb8165598a409043.exe 31 PID 2252 wrote to memory of 2772 2252 88dac7348311960b99e3bc957b60bd0dd69918dc10b29c2bfb8165598a409043.exe 31 PID 2252 wrote to memory of 2772 2252 88dac7348311960b99e3bc957b60bd0dd69918dc10b29c2bfb8165598a409043.exe 31 PID 2252 wrote to memory of 2772 2252 88dac7348311960b99e3bc957b60bd0dd69918dc10b29c2bfb8165598a409043.exe 31 PID 2772 wrote to memory of 3068 2772 Logo1_.exe 33 PID 2772 wrote to memory of 3068 2772 Logo1_.exe 33 PID 2772 wrote to memory of 3068 2772 Logo1_.exe 33 PID 2772 wrote to memory of 3068 2772 Logo1_.exe 33 PID 3068 wrote to memory of 2576 3068 net.exe 35 PID 3068 wrote to memory of 2576 3068 net.exe 35 PID 3068 wrote to memory of 2576 3068 net.exe 35 PID 3068 wrote to memory of 2576 3068 net.exe 35 PID 2752 wrote to memory of 2876 2752 cmd.exe 36 PID 2752 wrote to memory of 2876 2752 cmd.exe 36 PID 2752 wrote to memory of 2876 2752 cmd.exe 36 PID 2752 wrote to memory of 2876 2752 cmd.exe 36 PID 2772 wrote to memory of 1204 2772 Logo1_.exe 21 PID 2772 wrote to memory of 1204 2772 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\88dac7348311960b99e3bc957b60bd0dd69918dc10b29c2bfb8165598a409043.exe"C:\Users\Admin\AppData\Local\Temp\88dac7348311960b99e3bc957b60bd0dd69918dc10b29c2bfb8165598a409043.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a4CE8.bat3⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\88dac7348311960b99e3bc957b60bd0dd69918dc10b29c2bfb8165598a409043.exe"C:\Users\Admin\AppData\Local\Temp\88dac7348311960b99e3bc957b60bd0dd69918dc10b29c2bfb8165598a409043.exe"4⤵
- Executes dropped EXE
PID:2876
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:2576
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
254KB
MD58691ceb35086010047b7eb76d369f82f
SHA1b5c4d1c0175d123b216659b35ad50b9d1b176b79
SHA2564dd2da58f091a1232d3fec2ca607982fdf839c13d52c73fe6e15fd54f2d044e5
SHA5129bf0085573439dcebdab3e99dfa42970438d2f04fcc68af360635ed7cb38079882dbf6b684510b67b411584cd263f2654532fc7776306dd98b192f6ac4059de0
-
Filesize
474KB
MD56eabc463f8025a7e6e65f38cba22f126
SHA13e430ee5ec01c5509ed750b88d3473e7990dfe95
SHA256cc8da3ecd355b519d81415d279ed037c725ba221bf323d250aa92ee2b2b88ca7
SHA512c8fde7026ac8633403bbefee4b044457184388fb7343d8c46f5f7f272724227976bf485ea91da49e2a85dd0cfb73f260ac705d8007333dd3e5539fe5ed67e3ab
-
Filesize
722B
MD53aaeb86a54b004bdc564358ecd3bd476
SHA1aba4efd1f886083adb75e32916b043b1027e6388
SHA2566f9e00e1c63028a7a4998b629afdad0b80936be17c5b9fba8d175eca71c3b42e
SHA512c51ef77949e1c7a75868189f261112ae4a0c482af75824372b422816348a5dbbb4410535fa175ede69e51b16f3cb3d5de578fc31f7c9983cf438f0e41b248f70
-
C:\Users\Admin\AppData\Local\Temp\88dac7348311960b99e3bc957b60bd0dd69918dc10b29c2bfb8165598a409043.exe.exe
Filesize633KB
MD52e0d056ad62b6ef87a091003714fd512
SHA173150bddb5671c36413d9fbc94a668f132a2edc5
SHA256cb83f04591cc1d602e650dd5c12f4470cf21b04328477bd6a52081f37c04bd7c
SHA512b8e920f8b7547aec6f5771e3e6119b01157e5e36a92c67142b0d73ffe0d501d933581e1fc752e5bba9ce819e3897be9c146bebfc0018e91318b0c99d188a2580
-
Filesize
29KB
MD5208452b7e09eaf8db2d52b273802185a
SHA1566559b990e1c374db142c5da3037deb97bda61d
SHA2567393c04c0a78bfdf128e728b94cb18c9f0056a9d3da6c4944368debbef68234e
SHA5123880ac1f9ea1e4e510057764927e29497b95df2734fcda61e667e0a9164397874968a59853a60ec2bc52de97d98bd16253d0bf2474f855fd3805d19851d685ea
-
Filesize
9B
MD5e2a14c19421b289cbd51a76363b166bd
SHA15d0621d68da5a444f49c090b0725c7044d47fdb7
SHA256844af243be560dc4e478aa7ea28f4959f9df45f204006bade7ae52398d651835
SHA5128c49bec05605c4d2b8f07f00a7a39e70f5bd4f7c84ba221c615447f947053bf3bb0496c38e2bf8b15235c493cc5a0b41f34285fed1adb4c13572f25b67e178e5