Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20/10/2022, 07:19
Static task
static1
Behavioral task
behavioral1
Sample
88903d08f3fcb8438da72eb0a0b01deb4b0154b69e636df35f745b1aedd42fa1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
88903d08f3fcb8438da72eb0a0b01deb4b0154b69e636df35f745b1aedd42fa1.exe
Resource
win10v2004-20220812-en
General
-
Target
88903d08f3fcb8438da72eb0a0b01deb4b0154b69e636df35f745b1aedd42fa1.exe
-
Size
96KB
-
MD5
54284d3c667dd6a26da9598714047caa
-
SHA1
a24f0cd36dcf926aaf34892e91bcf6789d770fc6
-
SHA256
88903d08f3fcb8438da72eb0a0b01deb4b0154b69e636df35f745b1aedd42fa1
-
SHA512
151ddd215abada6a3fe4e36f8bab5c84ec166220c979f56fbcd136c8bfec82b3c3d48f3d699eed1d3d03dbaf02fae9e5678bc39516515b87a517c176bbfd17a4
-
SSDEEP
768:s06R0UKzOgnKqGR7//GPc0LOBhvBrHks3IiyhDYQbGmxlNaM+WGa1wuxnzgOYw9Y:yR0vxn3Pc0LCH9MtbvabUDzJYWu3B
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4800 WaterMark.exe -
resource yara_rule behavioral2/memory/4892-134-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4892-135-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4892-139-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4800-147-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral2/memory/4800-148-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral2/memory/4800-146-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral2/memory/4800-149-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral2/memory/4800-150-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral2/memory/4800-151-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral2/memory/4800-152-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral2/memory/4800-153-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\px93F8.tmp 88903d08f3fcb8438da72eb0a0b01deb4b0154b69e636df35f745b1aedd42fa1.exe File created C:\Program Files (x86)\Microsoft\WaterMark.exe 88903d08f3fcb8438da72eb0a0b01deb4b0154b69e636df35f745b1aedd42fa1.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe 88903d08f3fcb8438da72eb0a0b01deb4b0154b69e636df35f745b1aedd42fa1.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4080 4408 WerFault.exe 83 -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30991769" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{17FB6F8E-518D-11ED-B696-E64E24383C5C} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "4139168010" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "4223072825" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3970259510" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30991769" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30991769" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30991769" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30991769" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3970259510" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "4139168010" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "4223072825" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{17FDD116-518D-11ED-B696-E64E24383C5C} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30991769" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "373155194" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 4800 WaterMark.exe 4800 WaterMark.exe 4800 WaterMark.exe 4800 WaterMark.exe 4800 WaterMark.exe 4800 WaterMark.exe 4800 WaterMark.exe 4800 WaterMark.exe 4800 WaterMark.exe 4800 WaterMark.exe 4800 WaterMark.exe 4800 WaterMark.exe 4800 WaterMark.exe 4800 WaterMark.exe 4800 WaterMark.exe 4800 WaterMark.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4724 iexplore.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4800 WaterMark.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4724 iexplore.exe 3592 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 3592 iexplore.exe 3592 iexplore.exe 4724 iexplore.exe 4724 iexplore.exe 3264 IEXPLORE.EXE 3264 IEXPLORE.EXE 404 IEXPLORE.EXE 404 IEXPLORE.EXE 3264 IEXPLORE.EXE 3264 IEXPLORE.EXE -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4892 88903d08f3fcb8438da72eb0a0b01deb4b0154b69e636df35f745b1aedd42fa1.exe 4800 WaterMark.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 4892 wrote to memory of 4800 4892 88903d08f3fcb8438da72eb0a0b01deb4b0154b69e636df35f745b1aedd42fa1.exe 82 PID 4892 wrote to memory of 4800 4892 88903d08f3fcb8438da72eb0a0b01deb4b0154b69e636df35f745b1aedd42fa1.exe 82 PID 4892 wrote to memory of 4800 4892 88903d08f3fcb8438da72eb0a0b01deb4b0154b69e636df35f745b1aedd42fa1.exe 82 PID 4800 wrote to memory of 4408 4800 WaterMark.exe 83 PID 4800 wrote to memory of 4408 4800 WaterMark.exe 83 PID 4800 wrote to memory of 4408 4800 WaterMark.exe 83 PID 4800 wrote to memory of 4408 4800 WaterMark.exe 83 PID 4800 wrote to memory of 4408 4800 WaterMark.exe 83 PID 4800 wrote to memory of 4408 4800 WaterMark.exe 83 PID 4800 wrote to memory of 4408 4800 WaterMark.exe 83 PID 4800 wrote to memory of 4408 4800 WaterMark.exe 83 PID 4800 wrote to memory of 4408 4800 WaterMark.exe 83 PID 4800 wrote to memory of 3592 4800 WaterMark.exe 87 PID 4800 wrote to memory of 3592 4800 WaterMark.exe 87 PID 4800 wrote to memory of 4724 4800 WaterMark.exe 88 PID 4800 wrote to memory of 4724 4800 WaterMark.exe 88 PID 3592 wrote to memory of 404 3592 iexplore.exe 90 PID 3592 wrote to memory of 404 3592 iexplore.exe 90 PID 3592 wrote to memory of 404 3592 iexplore.exe 90 PID 4724 wrote to memory of 3264 4724 iexplore.exe 89 PID 4724 wrote to memory of 3264 4724 iexplore.exe 89 PID 4724 wrote to memory of 3264 4724 iexplore.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\88903d08f3fcb8438da72eb0a0b01deb4b0154b69e636df35f745b1aedd42fa1.exe"C:\Users\Admin\AppData\Local\Temp\88903d08f3fcb8438da72eb0a0b01deb4b0154b69e636df35f745b1aedd42fa1.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:4408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4408 -s 2044⤵
- Program crash
PID:4080
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3592 CREDAT:17410 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:404
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4724 CREDAT:17410 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3264
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4408 -ip 44081⤵PID:2012
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD554284d3c667dd6a26da9598714047caa
SHA1a24f0cd36dcf926aaf34892e91bcf6789d770fc6
SHA25688903d08f3fcb8438da72eb0a0b01deb4b0154b69e636df35f745b1aedd42fa1
SHA512151ddd215abada6a3fe4e36f8bab5c84ec166220c979f56fbcd136c8bfec82b3c3d48f3d699eed1d3d03dbaf02fae9e5678bc39516515b87a517c176bbfd17a4
-
Filesize
96KB
MD554284d3c667dd6a26da9598714047caa
SHA1a24f0cd36dcf926aaf34892e91bcf6789d770fc6
SHA25688903d08f3fcb8438da72eb0a0b01deb4b0154b69e636df35f745b1aedd42fa1
SHA512151ddd215abada6a3fe4e36f8bab5c84ec166220c979f56fbcd136c8bfec82b3c3d48f3d699eed1d3d03dbaf02fae9e5678bc39516515b87a517c176bbfd17a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD57550b85aee4221c59808672005ed8855
SHA1aeb269eff06f518132b9ecea824523fa125ba2d2
SHA2562b1c1e36c5419b7b3351aad8a08fee019473c832fe242ec2bf438b160d5eb8b2
SHA512216d401cb461099f7d2f3626957800cba77308b790ec181e2affb97339570bb9e168a56f3264cad79cd60589637679728fb2a87199a91667dc3ccfd4117f2bab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize434B
MD576304245133133855caba6a2c3a885b9
SHA1615989f13e05f5e29d2e5b1cd16afb198354606a
SHA256d7552a1c4793b803dfba3a21638fefd3792c184a5248dc4d95122ef11a13aa19
SHA51235d0fc3d9e82cbbbb12dc124daec7ccd90e61cb6f07a7807cc773eb70b61fcd230790678a25e8c673234ba42417c11a792d84b188077b6d31453aa1292741407
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{17FB6F8E-518D-11ED-B696-E64E24383C5C}.dat
Filesize3KB
MD551e991a710d0c8100dd6dacf6f46ca8d
SHA15fb55edba9d05bb23c9d9ae6388df51ed8448094
SHA256e2694addf8caea3a42958458f8366c25c75c14d3c50eb6d633af21d5cabfa813
SHA512c58e3cdbad4bcd20056fa7ea10eea202100eb6e91ae4dad08f8afea6b1fdc604e4e35b334376d4f03f4a1db96c09a4e08921b798e1d263092c9f7bc44aaa8c7f
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{17FDD116-518D-11ED-B696-E64E24383C5C}.dat
Filesize3KB
MD5b7dbfd83607f68c0232425b1f03e5d00
SHA1f81bd0f99252059fc8c237a61b8021310c154799
SHA2562f0d3feb891d51b5987582c0e827d5c6bd8ad42e610e8b643cb5cb32bc9d6d31
SHA5129990d722959c18f2bd7e5dfe723afd11f0f0cbc744a82b2d238619cfac3310cec07834a0e571e2b00fbbdcd9b7c8dfa6885c625f1b375983206b5b18b5a77773