Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 07:19
Static task
static1
Behavioral task
behavioral1
Sample
88903d08f3fcb8438da72eb0a0b01deb4b0154b69e636df35f745b1aedd42fa1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
88903d08f3fcb8438da72eb0a0b01deb4b0154b69e636df35f745b1aedd42fa1.exe
Resource
win10v2004-20220812-en
General
-
Target
88903d08f3fcb8438da72eb0a0b01deb4b0154b69e636df35f745b1aedd42fa1.exe
-
Size
96KB
-
MD5
54284d3c667dd6a26da9598714047caa
-
SHA1
a24f0cd36dcf926aaf34892e91bcf6789d770fc6
-
SHA256
88903d08f3fcb8438da72eb0a0b01deb4b0154b69e636df35f745b1aedd42fa1
-
SHA512
151ddd215abada6a3fe4e36f8bab5c84ec166220c979f56fbcd136c8bfec82b3c3d48f3d699eed1d3d03dbaf02fae9e5678bc39516515b87a517c176bbfd17a4
-
SSDEEP
768:s06R0UKzOgnKqGR7//GPc0LOBhvBrHks3IiyhDYQbGmxlNaM+WGa1wuxnzgOYw9Y:yR0vxn3Pc0LCH9MtbvabUDzJYWu3B
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,c:\\program files (x86)\\microsoft\\watermark.exe" svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 852 WaterMark.exe -
resource yara_rule behavioral1/memory/916-57-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/916-58-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/916-62-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/852-80-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral1/memory/852-79-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral1/memory/852-188-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 916 88903d08f3fcb8438da72eb0a0b01deb4b0154b69e636df35f745b1aedd42fa1.exe 916 88903d08f3fcb8438da72eb0a0b01deb4b0154b69e636df35f745b1aedd42fa1.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\dmlconf.dat svchost.exe File opened for modification C:\Windows\SysWOW64\dmlconf.dat svchost.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\px25AB.tmp 88903d08f3fcb8438da72eb0a0b01deb4b0154b69e636df35f745b1aedd42fa1.exe File created C:\Program Files (x86)\Microsoft\WaterMark.exe 88903d08f3fcb8438da72eb0a0b01deb4b0154b69e636df35f745b1aedd42fa1.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe 88903d08f3fcb8438da72eb0a0b01deb4b0154b69e636df35f745b1aedd42fa1.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7-zip.dll svchost.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 852 WaterMark.exe 852 WaterMark.exe 852 WaterMark.exe 852 WaterMark.exe 852 WaterMark.exe 852 WaterMark.exe 852 WaterMark.exe 852 WaterMark.exe 1312 svchost.exe 1312 svchost.exe 1312 svchost.exe 1312 svchost.exe 1312 svchost.exe 1312 svchost.exe 1312 svchost.exe 1312 svchost.exe 1312 svchost.exe 1312 svchost.exe 1312 svchost.exe 1312 svchost.exe 1312 svchost.exe 1312 svchost.exe 1312 svchost.exe 1312 svchost.exe 1312 svchost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 852 WaterMark.exe Token: SeDebugPrivilege 1312 svchost.exe Token: SeDebugPrivilege 852 WaterMark.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 916 88903d08f3fcb8438da72eb0a0b01deb4b0154b69e636df35f745b1aedd42fa1.exe 852 WaterMark.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 916 wrote to memory of 852 916 88903d08f3fcb8438da72eb0a0b01deb4b0154b69e636df35f745b1aedd42fa1.exe 27 PID 916 wrote to memory of 852 916 88903d08f3fcb8438da72eb0a0b01deb4b0154b69e636df35f745b1aedd42fa1.exe 27 PID 916 wrote to memory of 852 916 88903d08f3fcb8438da72eb0a0b01deb4b0154b69e636df35f745b1aedd42fa1.exe 27 PID 916 wrote to memory of 852 916 88903d08f3fcb8438da72eb0a0b01deb4b0154b69e636df35f745b1aedd42fa1.exe 27 PID 852 wrote to memory of 1724 852 WaterMark.exe 28 PID 852 wrote to memory of 1724 852 WaterMark.exe 28 PID 852 wrote to memory of 1724 852 WaterMark.exe 28 PID 852 wrote to memory of 1724 852 WaterMark.exe 28 PID 852 wrote to memory of 1724 852 WaterMark.exe 28 PID 852 wrote to memory of 1724 852 WaterMark.exe 28 PID 852 wrote to memory of 1724 852 WaterMark.exe 28 PID 852 wrote to memory of 1724 852 WaterMark.exe 28 PID 852 wrote to memory of 1724 852 WaterMark.exe 28 PID 852 wrote to memory of 1724 852 WaterMark.exe 28 PID 852 wrote to memory of 1312 852 WaterMark.exe 29 PID 852 wrote to memory of 1312 852 WaterMark.exe 29 PID 852 wrote to memory of 1312 852 WaterMark.exe 29 PID 852 wrote to memory of 1312 852 WaterMark.exe 29 PID 852 wrote to memory of 1312 852 WaterMark.exe 29 PID 852 wrote to memory of 1312 852 WaterMark.exe 29 PID 852 wrote to memory of 1312 852 WaterMark.exe 29 PID 852 wrote to memory of 1312 852 WaterMark.exe 29 PID 852 wrote to memory of 1312 852 WaterMark.exe 29 PID 852 wrote to memory of 1312 852 WaterMark.exe 29 PID 1312 wrote to memory of 260 1312 svchost.exe 26 PID 1312 wrote to memory of 260 1312 svchost.exe 26 PID 1312 wrote to memory of 260 1312 svchost.exe 26 PID 1312 wrote to memory of 260 1312 svchost.exe 26 PID 1312 wrote to memory of 260 1312 svchost.exe 26 PID 1312 wrote to memory of 332 1312 svchost.exe 25 PID 1312 wrote to memory of 332 1312 svchost.exe 25 PID 1312 wrote to memory of 332 1312 svchost.exe 25 PID 1312 wrote to memory of 332 1312 svchost.exe 25 PID 1312 wrote to memory of 332 1312 svchost.exe 25 PID 1312 wrote to memory of 368 1312 svchost.exe 5 PID 1312 wrote to memory of 368 1312 svchost.exe 5 PID 1312 wrote to memory of 368 1312 svchost.exe 5 PID 1312 wrote to memory of 368 1312 svchost.exe 5 PID 1312 wrote to memory of 368 1312 svchost.exe 5 PID 1312 wrote to memory of 376 1312 svchost.exe 4 PID 1312 wrote to memory of 376 1312 svchost.exe 4 PID 1312 wrote to memory of 376 1312 svchost.exe 4 PID 1312 wrote to memory of 376 1312 svchost.exe 4 PID 1312 wrote to memory of 376 1312 svchost.exe 4 PID 1312 wrote to memory of 416 1312 svchost.exe 3 PID 1312 wrote to memory of 416 1312 svchost.exe 3 PID 1312 wrote to memory of 416 1312 svchost.exe 3 PID 1312 wrote to memory of 416 1312 svchost.exe 3 PID 1312 wrote to memory of 416 1312 svchost.exe 3 PID 1312 wrote to memory of 460 1312 svchost.exe 2 PID 1312 wrote to memory of 460 1312 svchost.exe 2 PID 1312 wrote to memory of 460 1312 svchost.exe 2 PID 1312 wrote to memory of 460 1312 svchost.exe 2 PID 1312 wrote to memory of 460 1312 svchost.exe 2 PID 1312 wrote to memory of 476 1312 svchost.exe 1 PID 1312 wrote to memory of 476 1312 svchost.exe 1 PID 1312 wrote to memory of 476 1312 svchost.exe 1 PID 1312 wrote to memory of 476 1312 svchost.exe 1 PID 1312 wrote to memory of 476 1312 svchost.exe 1 PID 1312 wrote to memory of 484 1312 svchost.exe 24 PID 1312 wrote to memory of 484 1312 svchost.exe 24 PID 1312 wrote to memory of 484 1312 svchost.exe 24 PID 1312 wrote to memory of 484 1312 svchost.exe 24 PID 1312 wrote to memory of 484 1312 svchost.exe 24
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:476
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵PID:460
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:756
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵PID:1224
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵PID:1680
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵PID:1644
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵PID:1052
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵PID:452
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵PID:336
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵PID:888
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵PID:844
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵PID:816
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵PID:676
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵PID:600
-
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:416
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:376
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:368
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:484
-
-
\\?\C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R1⤵PID:1136
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1396
-
C:\Users\Admin\AppData\Local\Temp\88903d08f3fcb8438da72eb0a0b01deb4b0154b69e636df35f745b1aedd42fa1.exe"C:\Users\Admin\AppData\Local\Temp\88903d08f3fcb8438da72eb0a0b01deb4b0154b69e636df35f745b1aedd42fa1.exe"2⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe4⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Drops file in Program Files directory
PID:1724
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1312
-
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1340
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:332
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe1⤵PID:260
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD554284d3c667dd6a26da9598714047caa
SHA1a24f0cd36dcf926aaf34892e91bcf6789d770fc6
SHA25688903d08f3fcb8438da72eb0a0b01deb4b0154b69e636df35f745b1aedd42fa1
SHA512151ddd215abada6a3fe4e36f8bab5c84ec166220c979f56fbcd136c8bfec82b3c3d48f3d699eed1d3d03dbaf02fae9e5678bc39516515b87a517c176bbfd17a4
-
Filesize
96KB
MD554284d3c667dd6a26da9598714047caa
SHA1a24f0cd36dcf926aaf34892e91bcf6789d770fc6
SHA25688903d08f3fcb8438da72eb0a0b01deb4b0154b69e636df35f745b1aedd42fa1
SHA512151ddd215abada6a3fe4e36f8bab5c84ec166220c979f56fbcd136c8bfec82b3c3d48f3d699eed1d3d03dbaf02fae9e5678bc39516515b87a517c176bbfd17a4
-
Filesize
96KB
MD554284d3c667dd6a26da9598714047caa
SHA1a24f0cd36dcf926aaf34892e91bcf6789d770fc6
SHA25688903d08f3fcb8438da72eb0a0b01deb4b0154b69e636df35f745b1aedd42fa1
SHA512151ddd215abada6a3fe4e36f8bab5c84ec166220c979f56fbcd136c8bfec82b3c3d48f3d699eed1d3d03dbaf02fae9e5678bc39516515b87a517c176bbfd17a4
-
Filesize
96KB
MD554284d3c667dd6a26da9598714047caa
SHA1a24f0cd36dcf926aaf34892e91bcf6789d770fc6
SHA25688903d08f3fcb8438da72eb0a0b01deb4b0154b69e636df35f745b1aedd42fa1
SHA512151ddd215abada6a3fe4e36f8bab5c84ec166220c979f56fbcd136c8bfec82b3c3d48f3d699eed1d3d03dbaf02fae9e5678bc39516515b87a517c176bbfd17a4