Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
103s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20/10/2022, 12:24
Static task
static1
Behavioral task
behavioral1
Sample
f2b3499121baba009f05137bca2ffaf7ad4d582621f36febf563c55974718dd6.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f2b3499121baba009f05137bca2ffaf7ad4d582621f36febf563c55974718dd6.dll
Resource
win10v2004-20220812-en
General
-
Target
f2b3499121baba009f05137bca2ffaf7ad4d582621f36febf563c55974718dd6.dll
-
Size
260KB
-
MD5
96c79ea51c2beae60aa1e4881f3bd824
-
SHA1
47db43984d893fbcf363ce6a66ea94986925777e
-
SHA256
f2b3499121baba009f05137bca2ffaf7ad4d582621f36febf563c55974718dd6
-
SHA512
2aab23a13fc6bc791610e71c6f28ed262fe56de749d77e2d10f1d2bfededb061a4ed7b47cd7cae08053e43e30a6ceaae7e253d2a6c5b4330e28fcc03b654c3d1
-
SSDEEP
3072:sZmu9K33WSwdJ/tILtAPrL+oxdv9jD4Nn0LhlchQAItUkkH0jpgj7xIhVH/g:s8b33QqUrSqc0LDchQptQieVI//g
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3732 rundll32mgr.exe 1972 WaterMark.exe -
resource yara_rule behavioral2/memory/3732-140-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/3732-141-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/3732-146-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/3732-145-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/1972-149-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/1972-153-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/1972-156-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/1972-154-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/3732-157-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/1972-158-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/1972-159-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/1972-160-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/1972-161-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/1972-162-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\px2AF8.tmp rundll32mgr.exe File created C:\Program Files (x86)\Microsoft\WaterMark.exe rundll32mgr.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe rundll32mgr.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3096 2260 WerFault.exe 83 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3285036753" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3134725247" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3134725247" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "373183447" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30991835" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{E4F377D7-51CE-11ED-AECB-DA88DC7FA106} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30991835" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30991835" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 1972 WaterMark.exe 1972 WaterMark.exe 1972 WaterMark.exe 1972 WaterMark.exe 1972 WaterMark.exe 1972 WaterMark.exe 1972 WaterMark.exe 1972 WaterMark.exe 1972 WaterMark.exe 1972 WaterMark.exe 1972 WaterMark.exe 1972 WaterMark.exe 1972 WaterMark.exe 1972 WaterMark.exe 1972 WaterMark.exe 1972 WaterMark.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1972 WaterMark.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3968 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3968 iexplore.exe 3968 iexplore.exe 4316 IEXPLORE.EXE 4316 IEXPLORE.EXE 4316 IEXPLORE.EXE 4316 IEXPLORE.EXE -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3732 rundll32mgr.exe 1972 WaterMark.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1656 wrote to memory of 4912 1656 rundll32.exe 80 PID 1656 wrote to memory of 4912 1656 rundll32.exe 80 PID 1656 wrote to memory of 4912 1656 rundll32.exe 80 PID 4912 wrote to memory of 3732 4912 rundll32.exe 81 PID 4912 wrote to memory of 3732 4912 rundll32.exe 81 PID 4912 wrote to memory of 3732 4912 rundll32.exe 81 PID 3732 wrote to memory of 1972 3732 rundll32mgr.exe 82 PID 3732 wrote to memory of 1972 3732 rundll32mgr.exe 82 PID 3732 wrote to memory of 1972 3732 rundll32mgr.exe 82 PID 1972 wrote to memory of 2260 1972 WaterMark.exe 83 PID 1972 wrote to memory of 2260 1972 WaterMark.exe 83 PID 1972 wrote to memory of 2260 1972 WaterMark.exe 83 PID 1972 wrote to memory of 2260 1972 WaterMark.exe 83 PID 1972 wrote to memory of 2260 1972 WaterMark.exe 83 PID 1972 wrote to memory of 2260 1972 WaterMark.exe 83 PID 1972 wrote to memory of 2260 1972 WaterMark.exe 83 PID 1972 wrote to memory of 2260 1972 WaterMark.exe 83 PID 1972 wrote to memory of 2260 1972 WaterMark.exe 83 PID 1972 wrote to memory of 3968 1972 WaterMark.exe 85 PID 1972 wrote to memory of 3968 1972 WaterMark.exe 85 PID 1972 wrote to memory of 2964 1972 WaterMark.exe 86 PID 1972 wrote to memory of 2964 1972 WaterMark.exe 86 PID 3968 wrote to memory of 4316 3968 iexplore.exe 88 PID 3968 wrote to memory of 4316 3968 iexplore.exe 88 PID 3968 wrote to memory of 4316 3968 iexplore.exe 88
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f2b3499121baba009f05137bca2ffaf7ad4d582621f36febf563c55974718dd6.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f2b3499121baba009f05137bca2ffaf7ad4d582621f36febf563c55974718dd6.dll,#12⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe5⤵PID:2260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2260 -s 2086⤵
- Program crash
PID:3096
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3968 CREDAT:17410 /prefetch:26⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4316
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Modifies Internet Explorer settings
PID:2964
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2260 -ip 22601⤵PID:1996
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
117KB
MD58496f6a2cbd1e710149e098e047eaee2
SHA1dd0a84f13d385928e5270ef9b4b442150fd4a060
SHA256dfa3498dc41116db8aec3fd24721709e90248ad9de239222f1ed31f1f9286a03
SHA512c7a58e158ff3fbfd2bf5e2327221f6f5d24fc7abef2b48da63e98ee96efb3ff0e9d8ce8047f34f3843f385ca0607ee85a5ca7e0a8e3330366a23e99c1d9e3dd5
-
Filesize
117KB
MD58496f6a2cbd1e710149e098e047eaee2
SHA1dd0a84f13d385928e5270ef9b4b442150fd4a060
SHA256dfa3498dc41116db8aec3fd24721709e90248ad9de239222f1ed31f1f9286a03
SHA512c7a58e158ff3fbfd2bf5e2327221f6f5d24fc7abef2b48da63e98ee96efb3ff0e9d8ce8047f34f3843f385ca0607ee85a5ca7e0a8e3330366a23e99c1d9e3dd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD57550b85aee4221c59808672005ed8855
SHA1aeb269eff06f518132b9ecea824523fa125ba2d2
SHA2562b1c1e36c5419b7b3351aad8a08fee019473c832fe242ec2bf438b160d5eb8b2
SHA512216d401cb461099f7d2f3626957800cba77308b790ec181e2affb97339570bb9e168a56f3264cad79cd60589637679728fb2a87199a91667dc3ccfd4117f2bab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize434B
MD502b49e4e2df910337e1edef7571465a8
SHA14d73836e70305a908439b4ef05ec98fa707eea41
SHA25654902246d0b830ec4bafda400f30cb8ad0ab94c88958ab007692f43d370168fd
SHA5123459e1e759a0b81af42b1804ebf43d7403ab89bd636ea2dc419429d4e9cba81b13b28106012f8547ebc3903e3cb63e1443ae952cc87fd7a5f0d01ccd20d9cd63
-
Filesize
117KB
MD58496f6a2cbd1e710149e098e047eaee2
SHA1dd0a84f13d385928e5270ef9b4b442150fd4a060
SHA256dfa3498dc41116db8aec3fd24721709e90248ad9de239222f1ed31f1f9286a03
SHA512c7a58e158ff3fbfd2bf5e2327221f6f5d24fc7abef2b48da63e98ee96efb3ff0e9d8ce8047f34f3843f385ca0607ee85a5ca7e0a8e3330366a23e99c1d9e3dd5
-
Filesize
117KB
MD58496f6a2cbd1e710149e098e047eaee2
SHA1dd0a84f13d385928e5270ef9b4b442150fd4a060
SHA256dfa3498dc41116db8aec3fd24721709e90248ad9de239222f1ed31f1f9286a03
SHA512c7a58e158ff3fbfd2bf5e2327221f6f5d24fc7abef2b48da63e98ee96efb3ff0e9d8ce8047f34f3843f385ca0607ee85a5ca7e0a8e3330366a23e99c1d9e3dd5