Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
170s -
max time network
160s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 07:41
Static task
static1
Behavioral task
behavioral1
Sample
cc878688122b40ca6ed03730e319ce5a48e318442423df7505196bba6a4bc6d5.dll
Resource
win7-20220812-en
General
-
Target
cc878688122b40ca6ed03730e319ce5a48e318442423df7505196bba6a4bc6d5.dll
-
Size
264KB
-
MD5
45c8b34daa550fde1f82a2acccda5f07
-
SHA1
fcc639efb6d02a1dea64650fcfd913fd2393a759
-
SHA256
cc878688122b40ca6ed03730e319ce5a48e318442423df7505196bba6a4bc6d5
-
SHA512
ac114f6761fd9a2f7693bf9ea75238f9a3e8a7a3e505072f5217eb73d05ae1408825687949bc0335461df4867059c0c5a4f47b732cf81523dcc51b353d815e09
-
SSDEEP
3072:VdcQ2ZNMSQvbajUTUItjT68+xQUpr/lIylK8ZUaUubSG7cEe0XjQS+JxjwoDjlaF:lATSOjUQK4rtIylKC55IE3XkFjJDhaF
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,c:\\program files (x86)\\microsoft\\watermark.exe" svchost.exe -
Executes dropped EXE 2 IoCs
pid Process 1292 rundll32mgr.exe 832 WaterMark.exe -
resource yara_rule behavioral1/memory/1292-62-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1292-63-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1292-69-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/832-84-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral1/memory/832-192-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Loads dropped DLL 4 IoCs
pid Process 1492 rundll32.exe 1492 rundll32.exe 1292 rundll32mgr.exe 1292 rundll32mgr.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe File created C:\Windows\SysWOW64\dmlconf.dat svchost.exe File opened for modification C:\Windows\SysWOW64\dmlconf.dat svchost.exe -
Drops file in Program Files directory 8 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\7-zip32.dll svchost.exe File opened for modification C:\Program Files\7-Zip\7z.dll svchost.exe File opened for modification C:\Program Files\7-Zip\7z.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\px8FD2.tmp rundll32mgr.exe File created C:\Program Files (x86)\Microsoft\WaterMark.exe rundll32mgr.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe rundll32mgr.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7-zip.dll svchost.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 832 WaterMark.exe 832 WaterMark.exe 832 WaterMark.exe 832 WaterMark.exe 832 WaterMark.exe 832 WaterMark.exe 832 WaterMark.exe 832 WaterMark.exe 1588 svchost.exe 1588 svchost.exe 1588 svchost.exe 1588 svchost.exe 1588 svchost.exe 1588 svchost.exe 1588 svchost.exe 1588 svchost.exe 1588 svchost.exe 1588 svchost.exe 1588 svchost.exe 1588 svchost.exe 1588 svchost.exe 1588 svchost.exe 1588 svchost.exe 1588 svchost.exe 1588 svchost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 832 WaterMark.exe Token: SeDebugPrivilege 1588 svchost.exe Token: SeDebugPrivilege 832 WaterMark.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1292 rundll32mgr.exe 832 WaterMark.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1940 wrote to memory of 1492 1940 rundll32.exe 27 PID 1940 wrote to memory of 1492 1940 rundll32.exe 27 PID 1940 wrote to memory of 1492 1940 rundll32.exe 27 PID 1940 wrote to memory of 1492 1940 rundll32.exe 27 PID 1940 wrote to memory of 1492 1940 rundll32.exe 27 PID 1940 wrote to memory of 1492 1940 rundll32.exe 27 PID 1940 wrote to memory of 1492 1940 rundll32.exe 27 PID 1492 wrote to memory of 1292 1492 rundll32.exe 28 PID 1492 wrote to memory of 1292 1492 rundll32.exe 28 PID 1492 wrote to memory of 1292 1492 rundll32.exe 28 PID 1492 wrote to memory of 1292 1492 rundll32.exe 28 PID 1292 wrote to memory of 832 1292 rundll32mgr.exe 29 PID 1292 wrote to memory of 832 1292 rundll32mgr.exe 29 PID 1292 wrote to memory of 832 1292 rundll32mgr.exe 29 PID 1292 wrote to memory of 832 1292 rundll32mgr.exe 29 PID 832 wrote to memory of 1088 832 WaterMark.exe 30 PID 832 wrote to memory of 1088 832 WaterMark.exe 30 PID 832 wrote to memory of 1088 832 WaterMark.exe 30 PID 832 wrote to memory of 1088 832 WaterMark.exe 30 PID 832 wrote to memory of 1088 832 WaterMark.exe 30 PID 832 wrote to memory of 1088 832 WaterMark.exe 30 PID 832 wrote to memory of 1088 832 WaterMark.exe 30 PID 832 wrote to memory of 1088 832 WaterMark.exe 30 PID 832 wrote to memory of 1088 832 WaterMark.exe 30 PID 832 wrote to memory of 1088 832 WaterMark.exe 30 PID 832 wrote to memory of 1588 832 WaterMark.exe 31 PID 832 wrote to memory of 1588 832 WaterMark.exe 31 PID 832 wrote to memory of 1588 832 WaterMark.exe 31 PID 832 wrote to memory of 1588 832 WaterMark.exe 31 PID 832 wrote to memory of 1588 832 WaterMark.exe 31 PID 832 wrote to memory of 1588 832 WaterMark.exe 31 PID 832 wrote to memory of 1588 832 WaterMark.exe 31 PID 832 wrote to memory of 1588 832 WaterMark.exe 31 PID 832 wrote to memory of 1588 832 WaterMark.exe 31 PID 832 wrote to memory of 1588 832 WaterMark.exe 31 PID 1588 wrote to memory of 260 1588 svchost.exe 7 PID 1588 wrote to memory of 260 1588 svchost.exe 7 PID 1588 wrote to memory of 260 1588 svchost.exe 7 PID 1588 wrote to memory of 260 1588 svchost.exe 7 PID 1588 wrote to memory of 260 1588 svchost.exe 7 PID 1588 wrote to memory of 332 1588 svchost.exe 6 PID 1588 wrote to memory of 332 1588 svchost.exe 6 PID 1588 wrote to memory of 332 1588 svchost.exe 6 PID 1588 wrote to memory of 332 1588 svchost.exe 6 PID 1588 wrote to memory of 332 1588 svchost.exe 6 PID 1588 wrote to memory of 368 1588 svchost.exe 5 PID 1588 wrote to memory of 368 1588 svchost.exe 5 PID 1588 wrote to memory of 368 1588 svchost.exe 5 PID 1588 wrote to memory of 368 1588 svchost.exe 5 PID 1588 wrote to memory of 368 1588 svchost.exe 5 PID 1588 wrote to memory of 380 1588 svchost.exe 4 PID 1588 wrote to memory of 380 1588 svchost.exe 4 PID 1588 wrote to memory of 380 1588 svchost.exe 4 PID 1588 wrote to memory of 380 1588 svchost.exe 4 PID 1588 wrote to memory of 380 1588 svchost.exe 4 PID 1588 wrote to memory of 416 1588 svchost.exe 3 PID 1588 wrote to memory of 416 1588 svchost.exe 3 PID 1588 wrote to memory of 416 1588 svchost.exe 3 PID 1588 wrote to memory of 416 1588 svchost.exe 3 PID 1588 wrote to memory of 416 1588 svchost.exe 3 PID 1588 wrote to memory of 464 1588 svchost.exe 2 PID 1588 wrote to memory of 464 1588 svchost.exe 2 PID 1588 wrote to memory of 464 1588 svchost.exe 2 PID 1588 wrote to memory of 464 1588 svchost.exe 2
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:480
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵PID:464
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵PID:676
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵PID:1800
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵PID:764
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵PID:1228
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵PID:1056
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵PID:540
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵PID:296
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵PID:884
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵PID:860
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵PID:812
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:752
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵PID:600
-
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:416
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:380
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:368
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:488
-
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:332
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe1⤵PID:260
-
\\?\C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R1⤵PID:1988
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1360
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cc878688122b40ca6ed03730e319ce5a48e318442423df7505196bba6a4bc6d5.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cc878688122b40ca6ed03730e319ce5a48e318442423df7505196bba6a4bc6d5.dll,#13⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe6⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Drops file in Program Files directory
PID:1088
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1588
-
-
-
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1316
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112KB
MD59767edb24505caa3f9615ba0414e44ff
SHA142c91f4dc19dbad863845d4546731dfd5e6e9c14
SHA2565252232bda9f69119eace43194c74bb666bc32c5ec2012cb8a4f52750a534827
SHA512b9e733958c27537d2af9b933ffff4c2d52e067506b0e9aa2e51d16ef4cfaa28f163675e9b5c970993149ce7d3f5a796b5855bed18ae43d37535c4da4873f8644
-
Filesize
112KB
MD59767edb24505caa3f9615ba0414e44ff
SHA142c91f4dc19dbad863845d4546731dfd5e6e9c14
SHA2565252232bda9f69119eace43194c74bb666bc32c5ec2012cb8a4f52750a534827
SHA512b9e733958c27537d2af9b933ffff4c2d52e067506b0e9aa2e51d16ef4cfaa28f163675e9b5c970993149ce7d3f5a796b5855bed18ae43d37535c4da4873f8644
-
Filesize
112KB
MD59767edb24505caa3f9615ba0414e44ff
SHA142c91f4dc19dbad863845d4546731dfd5e6e9c14
SHA2565252232bda9f69119eace43194c74bb666bc32c5ec2012cb8a4f52750a534827
SHA512b9e733958c27537d2af9b933ffff4c2d52e067506b0e9aa2e51d16ef4cfaa28f163675e9b5c970993149ce7d3f5a796b5855bed18ae43d37535c4da4873f8644
-
Filesize
112KB
MD59767edb24505caa3f9615ba0414e44ff
SHA142c91f4dc19dbad863845d4546731dfd5e6e9c14
SHA2565252232bda9f69119eace43194c74bb666bc32c5ec2012cb8a4f52750a534827
SHA512b9e733958c27537d2af9b933ffff4c2d52e067506b0e9aa2e51d16ef4cfaa28f163675e9b5c970993149ce7d3f5a796b5855bed18ae43d37535c4da4873f8644
-
Filesize
112KB
MD59767edb24505caa3f9615ba0414e44ff
SHA142c91f4dc19dbad863845d4546731dfd5e6e9c14
SHA2565252232bda9f69119eace43194c74bb666bc32c5ec2012cb8a4f52750a534827
SHA512b9e733958c27537d2af9b933ffff4c2d52e067506b0e9aa2e51d16ef4cfaa28f163675e9b5c970993149ce7d3f5a796b5855bed18ae43d37535c4da4873f8644
-
Filesize
112KB
MD59767edb24505caa3f9615ba0414e44ff
SHA142c91f4dc19dbad863845d4546731dfd5e6e9c14
SHA2565252232bda9f69119eace43194c74bb666bc32c5ec2012cb8a4f52750a534827
SHA512b9e733958c27537d2af9b933ffff4c2d52e067506b0e9aa2e51d16ef4cfaa28f163675e9b5c970993149ce7d3f5a796b5855bed18ae43d37535c4da4873f8644
-
Filesize
112KB
MD59767edb24505caa3f9615ba0414e44ff
SHA142c91f4dc19dbad863845d4546731dfd5e6e9c14
SHA2565252232bda9f69119eace43194c74bb666bc32c5ec2012cb8a4f52750a534827
SHA512b9e733958c27537d2af9b933ffff4c2d52e067506b0e9aa2e51d16ef4cfaa28f163675e9b5c970993149ce7d3f5a796b5855bed18ae43d37535c4da4873f8644
-
Filesize
112KB
MD59767edb24505caa3f9615ba0414e44ff
SHA142c91f4dc19dbad863845d4546731dfd5e6e9c14
SHA2565252232bda9f69119eace43194c74bb666bc32c5ec2012cb8a4f52750a534827
SHA512b9e733958c27537d2af9b933ffff4c2d52e067506b0e9aa2e51d16ef4cfaa28f163675e9b5c970993149ce7d3f5a796b5855bed18ae43d37535c4da4873f8644