Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 19:15
Static task
static1
Behavioral task
behavioral1
Sample
7f0532e31738e042bc42c63b19d2a6660bb62e684c3c2ebe09aa162d19234da6.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7f0532e31738e042bc42c63b19d2a6660bb62e684c3c2ebe09aa162d19234da6.exe
Resource
win10v2004-20240802-en
General
-
Target
7f0532e31738e042bc42c63b19d2a6660bb62e684c3c2ebe09aa162d19234da6.exe
-
Size
694KB
-
MD5
2631cc61a8502963ea8782a366641b2b
-
SHA1
2118f3a9cfa867276af640a639eae097f57c6965
-
SHA256
7f0532e31738e042bc42c63b19d2a6660bb62e684c3c2ebe09aa162d19234da6
-
SHA512
dde8a6affac62da52dd7eb130b57fe93794b9331fe6f9576c04ace8ab3c25ea19b80faa6a31eb7927873b792de5b596efa561cf53f02dc2315c83dc07d026840
-
SSDEEP
12288:K7+TNcKAEJ6RLtx4c8PF39A55nJTuxGfqseVF+J92QpCgGy9RTPq6xy3NhYhYUnK:K7uNcKAEJ6Rpx4c8PF39A55nJMGfqse3
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2712 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2668 Logo1_.exe 2604 7f0532e31738e042bc42c63b19d2a6660bb62e684c3c2ebe09aa162d19234da6.exe -
Loads dropped DLL 2 IoCs
pid Process 2712 cmd.exe 2712 cmd.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Australia\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\java-rmi.exe Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\America\Kentucky\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Kentucky\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\shvlzm.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\reader_sl.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\PROPLUS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\HostSideAdapters\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Oasis\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\PublicAssemblies\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\be\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\access\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\144DPI\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Proof.en\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\1033\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\InfoPathOM\InfoPathOMFormServices\InfoPathOMFormServicesV12\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Hearts\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ka\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\images\in_sidebar\_desktop.ini Logo1_.exe File created C:\Program Files\DVD Maker\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ca\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java-rmi.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\META-INF\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\mk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\STARTUP\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Mail\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\120DPI\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\lib\zi\America\North_Dakota\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\css\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\cgg\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ro\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\LISTS\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\WATER\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Indian\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\de-DE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Sounds\Places\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe File created C:\Windows\rundl132.exe 7f0532e31738e042bc42c63b19d2a6660bb62e684c3c2ebe09aa162d19234da6.exe File created C:\Windows\Logo1_.exe 7f0532e31738e042bc42c63b19d2a6660bb62e684c3c2ebe09aa162d19234da6.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7f0532e31738e042bc42c63b19d2a6660bb62e684c3c2ebe09aa162d19234da6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logo1_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7f0532e31738e042bc42c63b19d2a6660bb62e684c3c2ebe09aa162d19234da6.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe 2668 Logo1_.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1740 wrote to memory of 2712 1740 7f0532e31738e042bc42c63b19d2a6660bb62e684c3c2ebe09aa162d19234da6.exe 31 PID 1740 wrote to memory of 2712 1740 7f0532e31738e042bc42c63b19d2a6660bb62e684c3c2ebe09aa162d19234da6.exe 31 PID 1740 wrote to memory of 2712 1740 7f0532e31738e042bc42c63b19d2a6660bb62e684c3c2ebe09aa162d19234da6.exe 31 PID 1740 wrote to memory of 2712 1740 7f0532e31738e042bc42c63b19d2a6660bb62e684c3c2ebe09aa162d19234da6.exe 31 PID 1740 wrote to memory of 2668 1740 7f0532e31738e042bc42c63b19d2a6660bb62e684c3c2ebe09aa162d19234da6.exe 32 PID 1740 wrote to memory of 2668 1740 7f0532e31738e042bc42c63b19d2a6660bb62e684c3c2ebe09aa162d19234da6.exe 32 PID 1740 wrote to memory of 2668 1740 7f0532e31738e042bc42c63b19d2a6660bb62e684c3c2ebe09aa162d19234da6.exe 32 PID 1740 wrote to memory of 2668 1740 7f0532e31738e042bc42c63b19d2a6660bb62e684c3c2ebe09aa162d19234da6.exe 32 PID 2668 wrote to memory of 2720 2668 Logo1_.exe 33 PID 2668 wrote to memory of 2720 2668 Logo1_.exe 33 PID 2668 wrote to memory of 2720 2668 Logo1_.exe 33 PID 2668 wrote to memory of 2720 2668 Logo1_.exe 33 PID 2720 wrote to memory of 2600 2720 net.exe 36 PID 2720 wrote to memory of 2600 2720 net.exe 36 PID 2720 wrote to memory of 2600 2720 net.exe 36 PID 2720 wrote to memory of 2600 2720 net.exe 36 PID 2712 wrote to memory of 2604 2712 cmd.exe 37 PID 2712 wrote to memory of 2604 2712 cmd.exe 37 PID 2712 wrote to memory of 2604 2712 cmd.exe 37 PID 2712 wrote to memory of 2604 2712 cmd.exe 37 PID 2668 wrote to memory of 1212 2668 Logo1_.exe 21 PID 2668 wrote to memory of 1212 2668 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\7f0532e31738e042bc42c63b19d2a6660bb62e684c3c2ebe09aa162d19234da6.exe"C:\Users\Admin\AppData\Local\Temp\7f0532e31738e042bc42c63b19d2a6660bb62e684c3c2ebe09aa162d19234da6.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$aE57F.bat3⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\7f0532e31738e042bc42c63b19d2a6660bb62e684c3c2ebe09aa162d19234da6.exe"C:\Users\Admin\AppData\Local\Temp\7f0532e31738e042bc42c63b19d2a6660bb62e684c3c2ebe09aa162d19234da6.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2604
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:2600
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD51710cf6c27788c8fdae00c38ba6b2b6a
SHA1d8f66b28b6394359802538bac6e631775944ad98
SHA25699b89c9448a3f4c968a92c9df9a3a653144f6cf5b33679a2c56f9f104a3eb4f5
SHA512535dbfa4112e4c11a6e6c304d45e18f0058b290248996cc839f2816c7cc6fd48f1076200d2ce6a8167351384aeb846b952d0199923670e8dfe87317688e42c4f
-
Filesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
Filesize
722B
MD5cdd5003873cdea42067252420e681c9e
SHA1408826e983a903a97286e6542932478173c501f4
SHA256f0c5ddf66cbeb61b5fe01076c5cf35a1628067ac0cb4b26fb4d09ca249b39ec2
SHA512d25d75f2d819eeb67b69b947d7156ffe3e9997397469e400a845e0b894670cadfac2a4c3952e60d76d3921e5aad0b857e798d971ef60a7ff9c7bb7dafd973d19
-
C:\Users\Admin\AppData\Local\Temp\7f0532e31738e042bc42c63b19d2a6660bb62e684c3c2ebe09aa162d19234da6.exe.exe
Filesize667KB
MD51611f32d75807a5902e1b63b94fc3c1c
SHA14b46b4d1ec8f5ea453367f5d7e3ed28265c894bd
SHA2565e32c717f224489d63a8e91729a24a29f5bcfbdb8f299cd2c4f13f8606166f8a
SHA5128d9e3c99fe3da058be4a04be6d4522454810ce2e0b05dc8ec63ea2b8b422cdb57107f30c80bb12dc39250e957823dcd98508087581507d81ad2abbb9796ce13e
-
Filesize
26KB
MD57abd02dcc99ac564591c6d671469d226
SHA19138a0572b4a24df05eafd110bb951fec6d7d567
SHA256d0ddcb7aa3267af033685eaf85453a27fef494460499c42b58ad06edfadbf408
SHA51206c8302cb301043d708c3f93eabfef90abbedb0cfb2e4f799b3dab12ee8d6c852eb5c63b51ecc7054e99007fb0ef471adf1c6d7dde939e561625fc424178a191
-
Filesize
9B
MD5e02899454c67c7d6d1af854fdcb53b67
SHA126fb213f7c299c2a4d8c4afd234ee0b751d7a30e
SHA2560e67e90646d3ba7b46f935b205c9f89e8bff2dca7aeda3cd5dfb93868b262315
SHA512e1519bebf62ab4cb28e630a201312812e04f815ec0663f7b68b478da97c0bf7c7c2238a8632540d3d1f37acbe83919fb198b39ebeb222c19faa2130ab65ffffa