Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
132s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2022, 21:30
Static task
static1
Behavioral task
behavioral1
Sample
1cfeed31a29583193c9ae6477ce9f4e50b86614a9794833e37792989660a1092.dll
Resource
win7-20220812-en
General
-
Target
1cfeed31a29583193c9ae6477ce9f4e50b86614a9794833e37792989660a1092.dll
-
Size
408KB
-
MD5
073500ec69c090b55df028bb28bc24e0
-
SHA1
9654bb1883890b822767472ac54dc03791d6ac96
-
SHA256
1cfeed31a29583193c9ae6477ce9f4e50b86614a9794833e37792989660a1092
-
SHA512
5065df48ff09066d53b05a2ee714e9572831b4287b96a28306953824bd13eb87c6a29eaeb324afe719b29b04eff864ef9e1c2c991f56a4e587c13fac7464fe09
-
SSDEEP
6144:N/u6A81l3T4/Db2TcwQGCbA2HiIasZsQeewQeeCQeesQeeKFQeefQeeytPUaYeza:I6A81u7QQGo9iILbtP6YLaYhCmc/Z/
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2116 regsvr32mgr.exe 4648 WaterMark.exe -
resource yara_rule behavioral2/memory/2116-139-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/2116-138-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/2116-142-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4648-150-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/4648-151-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/4648-152-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/4648-153-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/4648-154-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/4648-155-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/4648-156-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\regsvr32mgr.exe regsvr32.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe regsvr32mgr.exe File opened for modification C:\Program Files (x86)\Microsoft\pxE024.tmp regsvr32mgr.exe File created C:\Program Files (x86)\Microsoft\WaterMark.exe regsvr32mgr.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4428 536 WerFault.exe 86 -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "374562021" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2165854331" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30995045" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30995045" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30995045" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2177260620" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2165854331" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{AC7588C6-5E58-11ED-A0EE-4A7057C3C021} = "0" iexplore.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C58F1580-0DF3-401C-93B1-2D9DDA61CF04}\1.0\HELPDIR regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C58F1580-0DF3-401C-93B1-2D9DDA61CF04} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C58F1580-0DF3-401C-93B1-2D9DDA61CF04}\1.0 regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 4648 WaterMark.exe 4648 WaterMark.exe 4648 WaterMark.exe 4648 WaterMark.exe 4648 WaterMark.exe 4648 WaterMark.exe 4648 WaterMark.exe 4648 WaterMark.exe 4648 WaterMark.exe 4648 WaterMark.exe 4648 WaterMark.exe 4648 WaterMark.exe 4648 WaterMark.exe 4648 WaterMark.exe 4648 WaterMark.exe 4648 WaterMark.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3408 iexplore.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4648 WaterMark.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3408 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3408 iexplore.exe 3408 iexplore.exe 3156 IEXPLORE.EXE 3156 IEXPLORE.EXE 3156 IEXPLORE.EXE 3156 IEXPLORE.EXE -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2116 regsvr32mgr.exe 4648 WaterMark.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1268 wrote to memory of 1972 1268 regsvr32.exe 83 PID 1268 wrote to memory of 1972 1268 regsvr32.exe 83 PID 1268 wrote to memory of 1972 1268 regsvr32.exe 83 PID 1972 wrote to memory of 2116 1972 regsvr32.exe 84 PID 1972 wrote to memory of 2116 1972 regsvr32.exe 84 PID 1972 wrote to memory of 2116 1972 regsvr32.exe 84 PID 2116 wrote to memory of 4648 2116 regsvr32mgr.exe 85 PID 2116 wrote to memory of 4648 2116 regsvr32mgr.exe 85 PID 2116 wrote to memory of 4648 2116 regsvr32mgr.exe 85 PID 4648 wrote to memory of 536 4648 WaterMark.exe 86 PID 4648 wrote to memory of 536 4648 WaterMark.exe 86 PID 4648 wrote to memory of 536 4648 WaterMark.exe 86 PID 4648 wrote to memory of 536 4648 WaterMark.exe 86 PID 4648 wrote to memory of 536 4648 WaterMark.exe 86 PID 4648 wrote to memory of 536 4648 WaterMark.exe 86 PID 4648 wrote to memory of 536 4648 WaterMark.exe 86 PID 4648 wrote to memory of 536 4648 WaterMark.exe 86 PID 4648 wrote to memory of 536 4648 WaterMark.exe 86 PID 4648 wrote to memory of 3408 4648 WaterMark.exe 89 PID 4648 wrote to memory of 3408 4648 WaterMark.exe 89 PID 4648 wrote to memory of 2052 4648 WaterMark.exe 90 PID 4648 wrote to memory of 2052 4648 WaterMark.exe 90 PID 3408 wrote to memory of 3156 3408 iexplore.exe 91 PID 3408 wrote to memory of 3156 3408 iexplore.exe 91 PID 3408 wrote to memory of 3156 3408 iexplore.exe 91
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\1cfeed31a29583193c9ae6477ce9f4e50b86614a9794833e37792989660a1092.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\1cfeed31a29583193c9ae6477ce9f4e50b86614a9794833e37792989660a1092.dll2⤵
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\regsvr32mgr.exeC:\Windows\SysWOW64\regsvr32mgr.exe3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe5⤵PID:536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 536 -s 2086⤵
- Program crash
PID:4428
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3408 CREDAT:17410 /prefetch:26⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3156
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Modifies Internet Explorer settings
PID:2052
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 536 -ip 5361⤵PID:1004
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD50e0f0ae845d89c22bb6385f64a6b85fd
SHA10f3f1e7f18ab81572c5ce938d3880d4a5d7100ac
SHA2565a5b85c582d5d4b3b912ee6789babebf8ae6d87330d0d33d87274841952899dd
SHA512baec989a6329a2a60d954e83279fd57ba2000f8ed79e7a02d145bf44a5bffcd9a831c63f4b7d44e40c51e40b1dfbe72c5cebac04d0ce7b2295e3fd191b122350
-
Filesize
59KB
MD50e0f0ae845d89c22bb6385f64a6b85fd
SHA10f3f1e7f18ab81572c5ce938d3880d4a5d7100ac
SHA2565a5b85c582d5d4b3b912ee6789babebf8ae6d87330d0d33d87274841952899dd
SHA512baec989a6329a2a60d954e83279fd57ba2000f8ed79e7a02d145bf44a5bffcd9a831c63f4b7d44e40c51e40b1dfbe72c5cebac04d0ce7b2295e3fd191b122350
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD50ef90204485649be625ea2be1b9018fb
SHA128fbc0852140ec51d0c097a4962a160afa4d754b
SHA256c8028acd9a8c8c795b87cf835fc3182d003264608f161baa0ca020711b22bca0
SHA512b8bbba0dcc6cb6f87efb47a605953c93fcf93c5a65520b822ebfee25754632d6bb66c2a946f457e1e40a92556683ddb9d14f2703782833e12d7e37bb3b7fcec5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize434B
MD56a41fafe19d753217c8c5851c48bd07a
SHA1994b623110f58fcf5d521062363b4beb894cb63c
SHA256507097d5decb92f7a46cb59ac01970e8c1030cfb0cd5347a78a041d183cbf47d
SHA5129d90df06cf40da7c5dc285c70462d24694bcf00ce29e5e9752c137cde8bb5458137be1ebddec5b6c653cc8eae193ac5086f1f30a48cb0689dd39db2c714e81ba
-
Filesize
59KB
MD50e0f0ae845d89c22bb6385f64a6b85fd
SHA10f3f1e7f18ab81572c5ce938d3880d4a5d7100ac
SHA2565a5b85c582d5d4b3b912ee6789babebf8ae6d87330d0d33d87274841952899dd
SHA512baec989a6329a2a60d954e83279fd57ba2000f8ed79e7a02d145bf44a5bffcd9a831c63f4b7d44e40c51e40b1dfbe72c5cebac04d0ce7b2295e3fd191b122350
-
Filesize
59KB
MD50e0f0ae845d89c22bb6385f64a6b85fd
SHA10f3f1e7f18ab81572c5ce938d3880d4a5d7100ac
SHA2565a5b85c582d5d4b3b912ee6789babebf8ae6d87330d0d33d87274841952899dd
SHA512baec989a6329a2a60d954e83279fd57ba2000f8ed79e7a02d145bf44a5bffcd9a831c63f4b7d44e40c51e40b1dfbe72c5cebac04d0ce7b2295e3fd191b122350