Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
153s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 02:39
Static task
static1
Behavioral task
behavioral1
Sample
b201033f28361af6fd7baeaa5f1e90635198cda68a27f81d7c2baa9f667842bf.dll
Resource
win7-20220812-en
General
-
Target
b201033f28361af6fd7baeaa5f1e90635198cda68a27f81d7c2baa9f667842bf.dll
-
Size
691KB
-
MD5
a2fb9029d34ba7ab009c79f11b519580
-
SHA1
67534234e28e24857c9f622e20a2f41b311e4cac
-
SHA256
b201033f28361af6fd7baeaa5f1e90635198cda68a27f81d7c2baa9f667842bf
-
SHA512
df87748ef041414f88ff705fb7faa794dbaa04d90e324a093f8d68223560b82f7a9c43d099fe3ef42637ccddbc694ea7027ff19ffde4a3984b85b28f9efed8f5
-
SSDEEP
12288:rNIyZN4+Wv4PLq6Okrh9ZN/hs9DsdSx+R0:r9TPmirh9Zdh6/i0
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,c:\\program files (x86)\\microsoft\\watermark.exe" svchost.exe -
Executes dropped EXE 2 IoCs
pid Process 1256 rundll32mgr.exe 2036 WaterMark.exe -
resource yara_rule behavioral1/memory/1256-64-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1256-65-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1256-70-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2036-88-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2036-212-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Loads dropped DLL 4 IoCs
pid Process 1956 rundll32.exe 1956 rundll32.exe 1256 rundll32mgr.exe 1256 rundll32mgr.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe File created C:\Windows\SysWOW64\dmlconf.dat svchost.exe File opened for modification C:\Windows\SysWOW64\dmlconf.dat svchost.exe -
Drops file in Program Files directory 10 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe rundll32mgr.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7-zip.dll svchost.exe File opened for modification C:\Program Files\7-Zip\7z.dll svchost.exe File opened for modification C:\Program Files\7-Zip\7z.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\px4FC6.tmp rundll32mgr.exe File created C:\Program Files (x86)\Microsoft\WaterMark.exe rundll32mgr.exe File opened for modification C:\Program Files\7-Zip\7-zip32.dll svchost.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7zG.exe svchost.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1020 1956 WerFault.exe 27 -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 2036 WaterMark.exe 2036 WaterMark.exe 2036 WaterMark.exe 2036 WaterMark.exe 2036 WaterMark.exe 2036 WaterMark.exe 2036 WaterMark.exe 2036 WaterMark.exe 1916 svchost.exe 1916 svchost.exe 1916 svchost.exe 1916 svchost.exe 1916 svchost.exe 1916 svchost.exe 1916 svchost.exe 1916 svchost.exe 1916 svchost.exe 1916 svchost.exe 1916 svchost.exe 1916 svchost.exe 1916 svchost.exe 1916 svchost.exe 1916 svchost.exe 1916 svchost.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2036 WaterMark.exe Token: SeDebugPrivilege 1916 svchost.exe Token: SeDebugPrivilege 1956 rundll32.exe Token: SeDebugPrivilege 2036 WaterMark.exe Token: SeDebugPrivilege 1020 WerFault.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1256 rundll32mgr.exe 2036 WaterMark.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1476 wrote to memory of 1956 1476 rundll32.exe 27 PID 1476 wrote to memory of 1956 1476 rundll32.exe 27 PID 1476 wrote to memory of 1956 1476 rundll32.exe 27 PID 1476 wrote to memory of 1956 1476 rundll32.exe 27 PID 1476 wrote to memory of 1956 1476 rundll32.exe 27 PID 1476 wrote to memory of 1956 1476 rundll32.exe 27 PID 1476 wrote to memory of 1956 1476 rundll32.exe 27 PID 1956 wrote to memory of 1256 1956 rundll32.exe 28 PID 1956 wrote to memory of 1256 1956 rundll32.exe 28 PID 1956 wrote to memory of 1256 1956 rundll32.exe 28 PID 1956 wrote to memory of 1256 1956 rundll32.exe 28 PID 1256 wrote to memory of 2036 1256 rundll32mgr.exe 29 PID 1256 wrote to memory of 2036 1256 rundll32mgr.exe 29 PID 1256 wrote to memory of 2036 1256 rundll32mgr.exe 29 PID 1256 wrote to memory of 2036 1256 rundll32mgr.exe 29 PID 2036 wrote to memory of 1760 2036 WaterMark.exe 31 PID 1956 wrote to memory of 1020 1956 rundll32.exe 30 PID 1956 wrote to memory of 1020 1956 rundll32.exe 30 PID 1956 wrote to memory of 1020 1956 rundll32.exe 30 PID 1956 wrote to memory of 1020 1956 rundll32.exe 30 PID 2036 wrote to memory of 1760 2036 WaterMark.exe 31 PID 2036 wrote to memory of 1760 2036 WaterMark.exe 31 PID 2036 wrote to memory of 1760 2036 WaterMark.exe 31 PID 2036 wrote to memory of 1760 2036 WaterMark.exe 31 PID 2036 wrote to memory of 1760 2036 WaterMark.exe 31 PID 2036 wrote to memory of 1760 2036 WaterMark.exe 31 PID 2036 wrote to memory of 1760 2036 WaterMark.exe 31 PID 2036 wrote to memory of 1760 2036 WaterMark.exe 31 PID 2036 wrote to memory of 1760 2036 WaterMark.exe 31 PID 2036 wrote to memory of 1916 2036 WaterMark.exe 32 PID 2036 wrote to memory of 1916 2036 WaterMark.exe 32 PID 2036 wrote to memory of 1916 2036 WaterMark.exe 32 PID 2036 wrote to memory of 1916 2036 WaterMark.exe 32 PID 2036 wrote to memory of 1916 2036 WaterMark.exe 32 PID 2036 wrote to memory of 1916 2036 WaterMark.exe 32 PID 2036 wrote to memory of 1916 2036 WaterMark.exe 32 PID 2036 wrote to memory of 1916 2036 WaterMark.exe 32 PID 2036 wrote to memory of 1916 2036 WaterMark.exe 32 PID 2036 wrote to memory of 1916 2036 WaterMark.exe 32 PID 1916 wrote to memory of 260 1916 svchost.exe 7 PID 1916 wrote to memory of 260 1916 svchost.exe 7 PID 1916 wrote to memory of 260 1916 svchost.exe 7 PID 1916 wrote to memory of 260 1916 svchost.exe 7 PID 1916 wrote to memory of 260 1916 svchost.exe 7 PID 1916 wrote to memory of 332 1916 svchost.exe 6 PID 1916 wrote to memory of 332 1916 svchost.exe 6 PID 1916 wrote to memory of 332 1916 svchost.exe 6 PID 1916 wrote to memory of 332 1916 svchost.exe 6 PID 1916 wrote to memory of 332 1916 svchost.exe 6 PID 1916 wrote to memory of 368 1916 svchost.exe 5 PID 1916 wrote to memory of 368 1916 svchost.exe 5 PID 1916 wrote to memory of 368 1916 svchost.exe 5 PID 1916 wrote to memory of 368 1916 svchost.exe 5 PID 1916 wrote to memory of 368 1916 svchost.exe 5 PID 1916 wrote to memory of 376 1916 svchost.exe 4 PID 1916 wrote to memory of 376 1916 svchost.exe 4 PID 1916 wrote to memory of 376 1916 svchost.exe 4 PID 1916 wrote to memory of 376 1916 svchost.exe 4 PID 1916 wrote to memory of 376 1916 svchost.exe 4 PID 1916 wrote to memory of 416 1916 svchost.exe 3 PID 1916 wrote to memory of 416 1916 svchost.exe 3 PID 1916 wrote to memory of 416 1916 svchost.exe 3 PID 1916 wrote to memory of 416 1916 svchost.exe 3 PID 1916 wrote to memory of 416 1916 svchost.exe 3
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:476
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵PID:460
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵PID:788
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"3⤵PID:1320
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵PID:300
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵PID:1028
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵PID:1228
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵PID:968
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵PID:284
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵PID:868
-
\\?\C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R3⤵PID:1712
-
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵PID:956
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵PID:824
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:748
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵PID:648
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵PID:572
-
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:416
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:376
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:368
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:484
-
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:332
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe1⤵PID:260
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1380
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b201033f28361af6fd7baeaa5f1e90635198cda68a27f81d7c2baa9f667842bf.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b201033f28361af6fd7baeaa5f1e90635198cda68a27f81d7c2baa9f667842bf.dll,#13⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe6⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Drops file in Program Files directory
PID:1760
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1916
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1956 -s 2284⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:1020
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD589ec15b65572ad461a12bf515c8e59cf
SHA1bebc445ba7d5bd55bf1a64df2d99e470299b24ab
SHA25652b43a62647a170a90d7f62ba5fabb66529e6b9b958367c202d5d9edab5efbd0
SHA512030217c03de5b34d7a3cf84007e322174f3475c426f7ab922815af4e9910c8a84566a811a97a9f18e2ec1f71b0a495c94b149cc168935b76d9a559908a8db872
-
Filesize
106KB
MD589ec15b65572ad461a12bf515c8e59cf
SHA1bebc445ba7d5bd55bf1a64df2d99e470299b24ab
SHA25652b43a62647a170a90d7f62ba5fabb66529e6b9b958367c202d5d9edab5efbd0
SHA512030217c03de5b34d7a3cf84007e322174f3475c426f7ab922815af4e9910c8a84566a811a97a9f18e2ec1f71b0a495c94b149cc168935b76d9a559908a8db872
-
Filesize
106KB
MD589ec15b65572ad461a12bf515c8e59cf
SHA1bebc445ba7d5bd55bf1a64df2d99e470299b24ab
SHA25652b43a62647a170a90d7f62ba5fabb66529e6b9b958367c202d5d9edab5efbd0
SHA512030217c03de5b34d7a3cf84007e322174f3475c426f7ab922815af4e9910c8a84566a811a97a9f18e2ec1f71b0a495c94b149cc168935b76d9a559908a8db872
-
Filesize
106KB
MD589ec15b65572ad461a12bf515c8e59cf
SHA1bebc445ba7d5bd55bf1a64df2d99e470299b24ab
SHA25652b43a62647a170a90d7f62ba5fabb66529e6b9b958367c202d5d9edab5efbd0
SHA512030217c03de5b34d7a3cf84007e322174f3475c426f7ab922815af4e9910c8a84566a811a97a9f18e2ec1f71b0a495c94b149cc168935b76d9a559908a8db872
-
Filesize
106KB
MD589ec15b65572ad461a12bf515c8e59cf
SHA1bebc445ba7d5bd55bf1a64df2d99e470299b24ab
SHA25652b43a62647a170a90d7f62ba5fabb66529e6b9b958367c202d5d9edab5efbd0
SHA512030217c03de5b34d7a3cf84007e322174f3475c426f7ab922815af4e9910c8a84566a811a97a9f18e2ec1f71b0a495c94b149cc168935b76d9a559908a8db872
-
Filesize
106KB
MD589ec15b65572ad461a12bf515c8e59cf
SHA1bebc445ba7d5bd55bf1a64df2d99e470299b24ab
SHA25652b43a62647a170a90d7f62ba5fabb66529e6b9b958367c202d5d9edab5efbd0
SHA512030217c03de5b34d7a3cf84007e322174f3475c426f7ab922815af4e9910c8a84566a811a97a9f18e2ec1f71b0a495c94b149cc168935b76d9a559908a8db872
-
Filesize
106KB
MD589ec15b65572ad461a12bf515c8e59cf
SHA1bebc445ba7d5bd55bf1a64df2d99e470299b24ab
SHA25652b43a62647a170a90d7f62ba5fabb66529e6b9b958367c202d5d9edab5efbd0
SHA512030217c03de5b34d7a3cf84007e322174f3475c426f7ab922815af4e9910c8a84566a811a97a9f18e2ec1f71b0a495c94b149cc168935b76d9a559908a8db872
-
Filesize
106KB
MD589ec15b65572ad461a12bf515c8e59cf
SHA1bebc445ba7d5bd55bf1a64df2d99e470299b24ab
SHA25652b43a62647a170a90d7f62ba5fabb66529e6b9b958367c202d5d9edab5efbd0
SHA512030217c03de5b34d7a3cf84007e322174f3475c426f7ab922815af4e9910c8a84566a811a97a9f18e2ec1f71b0a495c94b149cc168935b76d9a559908a8db872