Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
02/10/2022, 05:00
Static task
static1
Behavioral task
behavioral1
Sample
06f5a82e39012ff2b5862fb7037df8178b734c462d74e036ed1beb3951ea780c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
06f5a82e39012ff2b5862fb7037df8178b734c462d74e036ed1beb3951ea780c.exe
Resource
win10v2004-20220812-en
General
-
Target
06f5a82e39012ff2b5862fb7037df8178b734c462d74e036ed1beb3951ea780c.exe
-
Size
1.1MB
-
MD5
732642d91b8fcb116b053152accadf6f
-
SHA1
17871feee8f967a7d1d9a43dea3bec8f83f38de3
-
SHA256
06f5a82e39012ff2b5862fb7037df8178b734c462d74e036ed1beb3951ea780c
-
SHA512
d3bb7a3f23663fa2065bd79b31af946966aa2559691099fe5383232f0a5857a1625df2f0ad876a86048f6e1c407ca5f715229e96029858ce9487c6474ed69832
-
SSDEEP
24576:LiM5uIshBc6ReEJwdQx5L9MFy75C7HMIPga:xuj06wdU9MZMQ
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,c:\\program files (x86)\\microsoft\\watermark.exe" svchost.exe -
Executes dropped EXE 2 IoCs
pid Process 956 06f5a82e39012ff2b5862fb7037df8178b734c462d74e036ed1beb3951ea780cmgr.exe 764 WaterMark.exe -
resource yara_rule behavioral1/memory/956-61-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/956-63-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/956-68-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/764-84-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/764-192-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Loads dropped DLL 4 IoCs
pid Process 1168 06f5a82e39012ff2b5862fb7037df8178b734c462d74e036ed1beb3951ea780c.exe 1168 06f5a82e39012ff2b5862fb7037df8178b734c462d74e036ed1beb3951ea780c.exe 956 06f5a82e39012ff2b5862fb7037df8178b734c462d74e036ed1beb3951ea780cmgr.exe 956 06f5a82e39012ff2b5862fb7037df8178b734c462d74e036ed1beb3951ea780cmgr.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\dmlconf.dat svchost.exe File opened for modification C:\Windows\SysWOW64\dmlconf.dat svchost.exe -
Drops file in Program Files directory 10 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\7zG.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\px7DE.tmp 06f5a82e39012ff2b5862fb7037df8178b734c462d74e036ed1beb3951ea780cmgr.exe File created C:\Program Files (x86)\Microsoft\WaterMark.exe 06f5a82e39012ff2b5862fb7037df8178b734c462d74e036ed1beb3951ea780cmgr.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe 06f5a82e39012ff2b5862fb7037df8178b734c462d74e036ed1beb3951ea780cmgr.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7z.dll svchost.exe File opened for modification C:\Program Files\7-Zip\7-zip.dll svchost.exe File opened for modification C:\Program Files\7-Zip\7-zip32.dll svchost.exe File opened for modification C:\Program Files\7-Zip\7z.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe svchost.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 764 WaterMark.exe 764 WaterMark.exe 764 WaterMark.exe 764 WaterMark.exe 764 WaterMark.exe 764 WaterMark.exe 764 WaterMark.exe 764 WaterMark.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 764 WaterMark.exe Token: SeDebugPrivilege 1540 svchost.exe Token: SeDebugPrivilege 764 WaterMark.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 956 06f5a82e39012ff2b5862fb7037df8178b734c462d74e036ed1beb3951ea780cmgr.exe 764 WaterMark.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1168 wrote to memory of 956 1168 06f5a82e39012ff2b5862fb7037df8178b734c462d74e036ed1beb3951ea780c.exe 27 PID 1168 wrote to memory of 956 1168 06f5a82e39012ff2b5862fb7037df8178b734c462d74e036ed1beb3951ea780c.exe 27 PID 1168 wrote to memory of 956 1168 06f5a82e39012ff2b5862fb7037df8178b734c462d74e036ed1beb3951ea780c.exe 27 PID 1168 wrote to memory of 956 1168 06f5a82e39012ff2b5862fb7037df8178b734c462d74e036ed1beb3951ea780c.exe 27 PID 956 wrote to memory of 764 956 06f5a82e39012ff2b5862fb7037df8178b734c462d74e036ed1beb3951ea780cmgr.exe 28 PID 956 wrote to memory of 764 956 06f5a82e39012ff2b5862fb7037df8178b734c462d74e036ed1beb3951ea780cmgr.exe 28 PID 956 wrote to memory of 764 956 06f5a82e39012ff2b5862fb7037df8178b734c462d74e036ed1beb3951ea780cmgr.exe 28 PID 956 wrote to memory of 764 956 06f5a82e39012ff2b5862fb7037df8178b734c462d74e036ed1beb3951ea780cmgr.exe 28 PID 764 wrote to memory of 780 764 WaterMark.exe 29 PID 764 wrote to memory of 780 764 WaterMark.exe 29 PID 764 wrote to memory of 780 764 WaterMark.exe 29 PID 764 wrote to memory of 780 764 WaterMark.exe 29 PID 764 wrote to memory of 780 764 WaterMark.exe 29 PID 764 wrote to memory of 780 764 WaterMark.exe 29 PID 764 wrote to memory of 780 764 WaterMark.exe 29 PID 764 wrote to memory of 780 764 WaterMark.exe 29 PID 764 wrote to memory of 780 764 WaterMark.exe 29 PID 764 wrote to memory of 780 764 WaterMark.exe 29 PID 764 wrote to memory of 1540 764 WaterMark.exe 30 PID 764 wrote to memory of 1540 764 WaterMark.exe 30 PID 764 wrote to memory of 1540 764 WaterMark.exe 30 PID 764 wrote to memory of 1540 764 WaterMark.exe 30 PID 764 wrote to memory of 1540 764 WaterMark.exe 30 PID 764 wrote to memory of 1540 764 WaterMark.exe 30 PID 764 wrote to memory of 1540 764 WaterMark.exe 30 PID 764 wrote to memory of 1540 764 WaterMark.exe 30 PID 764 wrote to memory of 1540 764 WaterMark.exe 30 PID 764 wrote to memory of 1540 764 WaterMark.exe 30 PID 1540 wrote to memory of 260 1540 svchost.exe 7 PID 1540 wrote to memory of 260 1540 svchost.exe 7 PID 1540 wrote to memory of 260 1540 svchost.exe 7 PID 1540 wrote to memory of 260 1540 svchost.exe 7 PID 1540 wrote to memory of 260 1540 svchost.exe 7 PID 1540 wrote to memory of 332 1540 svchost.exe 6 PID 1540 wrote to memory of 332 1540 svchost.exe 6 PID 1540 wrote to memory of 332 1540 svchost.exe 6 PID 1540 wrote to memory of 332 1540 svchost.exe 6 PID 1540 wrote to memory of 332 1540 svchost.exe 6 PID 1540 wrote to memory of 368 1540 svchost.exe 5 PID 1540 wrote to memory of 368 1540 svchost.exe 5 PID 1540 wrote to memory of 368 1540 svchost.exe 5 PID 1540 wrote to memory of 368 1540 svchost.exe 5 PID 1540 wrote to memory of 368 1540 svchost.exe 5 PID 1540 wrote to memory of 384 1540 svchost.exe 4 PID 1540 wrote to memory of 384 1540 svchost.exe 4 PID 1540 wrote to memory of 384 1540 svchost.exe 4 PID 1540 wrote to memory of 384 1540 svchost.exe 4 PID 1540 wrote to memory of 384 1540 svchost.exe 4 PID 1540 wrote to memory of 420 1540 svchost.exe 3 PID 1540 wrote to memory of 420 1540 svchost.exe 3 PID 1540 wrote to memory of 420 1540 svchost.exe 3 PID 1540 wrote to memory of 420 1540 svchost.exe 3 PID 1540 wrote to memory of 420 1540 svchost.exe 3 PID 1540 wrote to memory of 464 1540 svchost.exe 2 PID 1540 wrote to memory of 464 1540 svchost.exe 2 PID 1540 wrote to memory of 464 1540 svchost.exe 2 PID 1540 wrote to memory of 464 1540 svchost.exe 2 PID 1540 wrote to memory of 464 1540 svchost.exe 2 PID 1540 wrote to memory of 480 1540 svchost.exe 1 PID 1540 wrote to memory of 480 1540 svchost.exe 1 PID 1540 wrote to memory of 480 1540 svchost.exe 1 PID 1540 wrote to memory of 480 1540 svchost.exe 1 PID 1540 wrote to memory of 480 1540 svchost.exe 1 PID 1540 wrote to memory of 488 1540 svchost.exe 8
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:480
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵PID:464
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵PID:880
-
\\?\C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R3⤵PID:1820
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵PID:852
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵PID:304
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵PID:1132
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵PID:1052
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵PID:324
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵PID:808
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:756
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵PID:1604
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵PID:960
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵PID:680
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵PID:600
-
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:420
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:384
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:368
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:488
-
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:332
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe1⤵PID:260
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1232
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1304
-
C:\Users\Admin\AppData\Local\Temp\06f5a82e39012ff2b5862fb7037df8178b734c462d74e036ed1beb3951ea780c.exe"C:\Users\Admin\AppData\Local\Temp\06f5a82e39012ff2b5862fb7037df8178b734c462d74e036ed1beb3951ea780c.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Users\Admin\AppData\Local\Temp\06f5a82e39012ff2b5862fb7037df8178b734c462d74e036ed1beb3951ea780cmgr.exeC:\Users\Admin\AppData\Local\Temp\06f5a82e39012ff2b5862fb7037df8178b734c462d74e036ed1beb3951ea780cmgr.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe5⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Drops file in Program Files directory
PID:780
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1540
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
119KB
MD59d5d609dc8e2554054733d19eed45c5c
SHA1ce72453fca9f477940a9def32bd8463549c6e1e4
SHA2567a85b3db04beb0c4b6a8929fdf79726bcf1084efab0a9f04a8ebaa0a2bc9e0b1
SHA512012cabde17ed1c1d1a48b5bc136591ff9c8e261e5da8bc7f67d0bd235a32150f63274362cdeef2376d2d5a38dfb0c9acc7cd3aa5244c1858b88b183f8cbe550b
-
Filesize
119KB
MD59d5d609dc8e2554054733d19eed45c5c
SHA1ce72453fca9f477940a9def32bd8463549c6e1e4
SHA2567a85b3db04beb0c4b6a8929fdf79726bcf1084efab0a9f04a8ebaa0a2bc9e0b1
SHA512012cabde17ed1c1d1a48b5bc136591ff9c8e261e5da8bc7f67d0bd235a32150f63274362cdeef2376d2d5a38dfb0c9acc7cd3aa5244c1858b88b183f8cbe550b
-
C:\Users\Admin\AppData\Local\Temp\06f5a82e39012ff2b5862fb7037df8178b734c462d74e036ed1beb3951ea780cmgr.exe
Filesize119KB
MD59d5d609dc8e2554054733d19eed45c5c
SHA1ce72453fca9f477940a9def32bd8463549c6e1e4
SHA2567a85b3db04beb0c4b6a8929fdf79726bcf1084efab0a9f04a8ebaa0a2bc9e0b1
SHA512012cabde17ed1c1d1a48b5bc136591ff9c8e261e5da8bc7f67d0bd235a32150f63274362cdeef2376d2d5a38dfb0c9acc7cd3aa5244c1858b88b183f8cbe550b
-
C:\Users\Admin\AppData\Local\Temp\06f5a82e39012ff2b5862fb7037df8178b734c462d74e036ed1beb3951ea780cmgr.exe
Filesize119KB
MD59d5d609dc8e2554054733d19eed45c5c
SHA1ce72453fca9f477940a9def32bd8463549c6e1e4
SHA2567a85b3db04beb0c4b6a8929fdf79726bcf1084efab0a9f04a8ebaa0a2bc9e0b1
SHA512012cabde17ed1c1d1a48b5bc136591ff9c8e261e5da8bc7f67d0bd235a32150f63274362cdeef2376d2d5a38dfb0c9acc7cd3aa5244c1858b88b183f8cbe550b
-
Filesize
119KB
MD59d5d609dc8e2554054733d19eed45c5c
SHA1ce72453fca9f477940a9def32bd8463549c6e1e4
SHA2567a85b3db04beb0c4b6a8929fdf79726bcf1084efab0a9f04a8ebaa0a2bc9e0b1
SHA512012cabde17ed1c1d1a48b5bc136591ff9c8e261e5da8bc7f67d0bd235a32150f63274362cdeef2376d2d5a38dfb0c9acc7cd3aa5244c1858b88b183f8cbe550b
-
Filesize
119KB
MD59d5d609dc8e2554054733d19eed45c5c
SHA1ce72453fca9f477940a9def32bd8463549c6e1e4
SHA2567a85b3db04beb0c4b6a8929fdf79726bcf1084efab0a9f04a8ebaa0a2bc9e0b1
SHA512012cabde17ed1c1d1a48b5bc136591ff9c8e261e5da8bc7f67d0bd235a32150f63274362cdeef2376d2d5a38dfb0c9acc7cd3aa5244c1858b88b183f8cbe550b
-
\Users\Admin\AppData\Local\Temp\06f5a82e39012ff2b5862fb7037df8178b734c462d74e036ed1beb3951ea780cmgr.exe
Filesize119KB
MD59d5d609dc8e2554054733d19eed45c5c
SHA1ce72453fca9f477940a9def32bd8463549c6e1e4
SHA2567a85b3db04beb0c4b6a8929fdf79726bcf1084efab0a9f04a8ebaa0a2bc9e0b1
SHA512012cabde17ed1c1d1a48b5bc136591ff9c8e261e5da8bc7f67d0bd235a32150f63274362cdeef2376d2d5a38dfb0c9acc7cd3aa5244c1858b88b183f8cbe550b
-
\Users\Admin\AppData\Local\Temp\06f5a82e39012ff2b5862fb7037df8178b734c462d74e036ed1beb3951ea780cmgr.exe
Filesize119KB
MD59d5d609dc8e2554054733d19eed45c5c
SHA1ce72453fca9f477940a9def32bd8463549c6e1e4
SHA2567a85b3db04beb0c4b6a8929fdf79726bcf1084efab0a9f04a8ebaa0a2bc9e0b1
SHA512012cabde17ed1c1d1a48b5bc136591ff9c8e261e5da8bc7f67d0bd235a32150f63274362cdeef2376d2d5a38dfb0c9acc7cd3aa5244c1858b88b183f8cbe550b