Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
187s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 12:07
Static task
static1
Behavioral task
behavioral1
Sample
ddec3bbfcef0f8f9d618900ee6a516a603f4b04a11f3278ed9fc6422f1aa831d.exe
Resource
win7-20221111-en
General
-
Target
ddec3bbfcef0f8f9d618900ee6a516a603f4b04a11f3278ed9fc6422f1aa831d.exe
-
Size
121KB
-
MD5
dde3eadc52b0b9d94334342185bc0802
-
SHA1
344281d825f4b94779c278def024eef72a6d9657
-
SHA256
ddec3bbfcef0f8f9d618900ee6a516a603f4b04a11f3278ed9fc6422f1aa831d
-
SHA512
4ac85fda88c517c9a974e57f675e7153cee143878d6cc75ec370f21cd26bac60f953c326d594e902cfca5f481c7a0ee9ce714034d07a6c871126e76faa78b132
-
SSDEEP
768:9QxkwiHBsIqHpcrkMEYEhA7P4RhAtmaZFb79U9MKAjBEig6/1k21m3uHRdMNDj2f:98kwitTEhU4HDa1KkjWXUa21mc/Mue9G
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,c:\\program files (x86)\\microsoft\\watermark.exe" svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 460 WaterMark.exe -
resource yara_rule behavioral1/memory/268-57-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral1/memory/460-65-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral1/memory/460-182-0x0000000000400000-0x0000000000426000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 268 ddec3bbfcef0f8f9d618900ee6a516a603f4b04a11f3278ed9fc6422f1aa831d.exe 268 ddec3bbfcef0f8f9d618900ee6a516a603f4b04a11f3278ed9fc6422f1aa831d.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\dmlconf.dat svchost.exe File created C:\Windows\SysWOW64\dmlconf.dat svchost.exe -
Drops file in Program Files directory 10 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\pxAAB2.tmp ddec3bbfcef0f8f9d618900ee6a516a603f4b04a11f3278ed9fc6422f1aa831d.exe File created C:\Program Files (x86)\Microsoft\WaterMark.exe ddec3bbfcef0f8f9d618900ee6a516a603f4b04a11f3278ed9fc6422f1aa831d.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe ddec3bbfcef0f8f9d618900ee6a516a603f4b04a11f3278ed9fc6422f1aa831d.exe File opened for modification C:\Program Files\7-Zip\7-zip.dll svchost.exe File opened for modification C:\Program Files\7-Zip\7-zip32.dll svchost.exe File opened for modification C:\Program Files\7-Zip\7z.dll svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7z.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7zG.exe svchost.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 460 WaterMark.exe 460 WaterMark.exe 460 WaterMark.exe 460 WaterMark.exe 460 WaterMark.exe 460 WaterMark.exe 460 WaterMark.exe 460 WaterMark.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe 1856 svchost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 460 WaterMark.exe Token: SeDebugPrivilege 1856 svchost.exe Token: SeDebugPrivilege 460 WaterMark.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 268 wrote to memory of 460 268 ddec3bbfcef0f8f9d618900ee6a516a603f4b04a11f3278ed9fc6422f1aa831d.exe 28 PID 268 wrote to memory of 460 268 ddec3bbfcef0f8f9d618900ee6a516a603f4b04a11f3278ed9fc6422f1aa831d.exe 28 PID 268 wrote to memory of 460 268 ddec3bbfcef0f8f9d618900ee6a516a603f4b04a11f3278ed9fc6422f1aa831d.exe 28 PID 268 wrote to memory of 460 268 ddec3bbfcef0f8f9d618900ee6a516a603f4b04a11f3278ed9fc6422f1aa831d.exe 28 PID 460 wrote to memory of 584 460 WaterMark.exe 29 PID 460 wrote to memory of 584 460 WaterMark.exe 29 PID 460 wrote to memory of 584 460 WaterMark.exe 29 PID 460 wrote to memory of 584 460 WaterMark.exe 29 PID 460 wrote to memory of 584 460 WaterMark.exe 29 PID 460 wrote to memory of 584 460 WaterMark.exe 29 PID 460 wrote to memory of 584 460 WaterMark.exe 29 PID 460 wrote to memory of 584 460 WaterMark.exe 29 PID 460 wrote to memory of 584 460 WaterMark.exe 29 PID 460 wrote to memory of 584 460 WaterMark.exe 29 PID 460 wrote to memory of 1856 460 WaterMark.exe 30 PID 460 wrote to memory of 1856 460 WaterMark.exe 30 PID 460 wrote to memory of 1856 460 WaterMark.exe 30 PID 460 wrote to memory of 1856 460 WaterMark.exe 30 PID 460 wrote to memory of 1856 460 WaterMark.exe 30 PID 460 wrote to memory of 1856 460 WaterMark.exe 30 PID 460 wrote to memory of 1856 460 WaterMark.exe 30 PID 460 wrote to memory of 1856 460 WaterMark.exe 30 PID 460 wrote to memory of 1856 460 WaterMark.exe 30 PID 460 wrote to memory of 1856 460 WaterMark.exe 30 PID 1856 wrote to memory of 260 1856 svchost.exe 7 PID 1856 wrote to memory of 260 1856 svchost.exe 7 PID 1856 wrote to memory of 260 1856 svchost.exe 7 PID 1856 wrote to memory of 260 1856 svchost.exe 7 PID 1856 wrote to memory of 260 1856 svchost.exe 7 PID 1856 wrote to memory of 332 1856 svchost.exe 6 PID 1856 wrote to memory of 332 1856 svchost.exe 6 PID 1856 wrote to memory of 332 1856 svchost.exe 6 PID 1856 wrote to memory of 332 1856 svchost.exe 6 PID 1856 wrote to memory of 332 1856 svchost.exe 6 PID 1856 wrote to memory of 368 1856 svchost.exe 5 PID 1856 wrote to memory of 368 1856 svchost.exe 5 PID 1856 wrote to memory of 368 1856 svchost.exe 5 PID 1856 wrote to memory of 368 1856 svchost.exe 5 PID 1856 wrote to memory of 368 1856 svchost.exe 5 PID 1856 wrote to memory of 380 1856 svchost.exe 4 PID 1856 wrote to memory of 380 1856 svchost.exe 4 PID 1856 wrote to memory of 380 1856 svchost.exe 4 PID 1856 wrote to memory of 380 1856 svchost.exe 4 PID 1856 wrote to memory of 380 1856 svchost.exe 4 PID 1856 wrote to memory of 416 1856 svchost.exe 3 PID 1856 wrote to memory of 416 1856 svchost.exe 3 PID 1856 wrote to memory of 416 1856 svchost.exe 3 PID 1856 wrote to memory of 416 1856 svchost.exe 3 PID 1856 wrote to memory of 416 1856 svchost.exe 3 PID 1856 wrote to memory of 464 1856 svchost.exe 2 PID 1856 wrote to memory of 464 1856 svchost.exe 2 PID 1856 wrote to memory of 464 1856 svchost.exe 2 PID 1856 wrote to memory of 464 1856 svchost.exe 2 PID 1856 wrote to memory of 464 1856 svchost.exe 2 PID 1856 wrote to memory of 472 1856 svchost.exe 1 PID 1856 wrote to memory of 472 1856 svchost.exe 1 PID 1856 wrote to memory of 472 1856 svchost.exe 1 PID 1856 wrote to memory of 472 1856 svchost.exe 1 PID 1856 wrote to memory of 472 1856 svchost.exe 1 PID 1856 wrote to memory of 480 1856 svchost.exe 8 PID 1856 wrote to memory of 480 1856 svchost.exe 8 PID 1856 wrote to memory of 480 1856 svchost.exe 8 PID 1856 wrote to memory of 480 1856 svchost.exe 8 PID 1856 wrote to memory of 480 1856 svchost.exe 8
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:472
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵PID:464
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵PID:804
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"3⤵PID:1184
-
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:756
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵PID:672
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵PID:596
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe3⤵PID:1176
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵PID:844
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵PID:868
-
\\?\C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R3⤵PID:1988
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵PID:1040
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵PID:324
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵PID:284
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵PID:1120
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵PID:1076
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵PID:1648
-
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:416
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:380
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:368
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:480
-
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:332
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe1⤵PID:260
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\ddec3bbfcef0f8f9d618900ee6a516a603f4b04a11f3278ed9fc6422f1aa831d.exe"C:\Users\Admin\AppData\Local\Temp\ddec3bbfcef0f8f9d618900ee6a516a603f4b04a11f3278ed9fc6422f1aa831d.exe"2⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:460 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe4⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Drops file in Program Files directory
PID:584
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1856
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
121KB
MD5dde3eadc52b0b9d94334342185bc0802
SHA1344281d825f4b94779c278def024eef72a6d9657
SHA256ddec3bbfcef0f8f9d618900ee6a516a603f4b04a11f3278ed9fc6422f1aa831d
SHA5124ac85fda88c517c9a974e57f675e7153cee143878d6cc75ec370f21cd26bac60f953c326d594e902cfca5f481c7a0ee9ce714034d07a6c871126e76faa78b132
-
Filesize
121KB
MD5dde3eadc52b0b9d94334342185bc0802
SHA1344281d825f4b94779c278def024eef72a6d9657
SHA256ddec3bbfcef0f8f9d618900ee6a516a603f4b04a11f3278ed9fc6422f1aa831d
SHA5124ac85fda88c517c9a974e57f675e7153cee143878d6cc75ec370f21cd26bac60f953c326d594e902cfca5f481c7a0ee9ce714034d07a6c871126e76faa78b132
-
Filesize
121KB
MD5dde3eadc52b0b9d94334342185bc0802
SHA1344281d825f4b94779c278def024eef72a6d9657
SHA256ddec3bbfcef0f8f9d618900ee6a516a603f4b04a11f3278ed9fc6422f1aa831d
SHA5124ac85fda88c517c9a974e57f675e7153cee143878d6cc75ec370f21cd26bac60f953c326d594e902cfca5f481c7a0ee9ce714034d07a6c871126e76faa78b132
-
Filesize
121KB
MD5dde3eadc52b0b9d94334342185bc0802
SHA1344281d825f4b94779c278def024eef72a6d9657
SHA256ddec3bbfcef0f8f9d618900ee6a516a603f4b04a11f3278ed9fc6422f1aa831d
SHA5124ac85fda88c517c9a974e57f675e7153cee143878d6cc75ec370f21cd26bac60f953c326d594e902cfca5f481c7a0ee9ce714034d07a6c871126e76faa78b132