Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04/12/2022, 02:08
Static task
static1
Behavioral task
behavioral1
Sample
87be197e7bbaf9470632ac5d501ddbc28bc2cc44a528fcd0151d5361f6fea1ff.dll
Resource
win7-20221111-en
General
-
Target
87be197e7bbaf9470632ac5d501ddbc28bc2cc44a528fcd0151d5361f6fea1ff.dll
-
Size
184KB
-
MD5
2adf539027acb9ad91b89f339241f8fd
-
SHA1
fa9accd7f1bc16254d144090dacf2bef7a7e6bd0
-
SHA256
87be197e7bbaf9470632ac5d501ddbc28bc2cc44a528fcd0151d5361f6fea1ff
-
SHA512
43ffcad4f8d68c949874c9e8ea8c182c5f4e1641340990bc5e1f8edbfdf7706a8c92dcad5b81caa0569a2f09244efb31315acfd3d72bbc984ec294f771628db8
-
SSDEEP
3072:Ln4cV8gf2u41Z5tKlwU+1lSepZ2LD1fvEXqbeE:z4y8gOl2YHSepZUlf
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3856 rundll32mgr.exe 4588 WaterMark.exe -
resource yara_rule behavioral2/memory/3856-140-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/3856-141-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/3856-145-0x0000000000400000-0x0000000000440000-memory.dmp upx behavioral2/memory/3856-147-0x0000000000400000-0x0000000000440000-memory.dmp upx behavioral2/memory/3856-146-0x0000000000400000-0x0000000000440000-memory.dmp upx behavioral2/memory/3856-149-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4588-156-0x0000000000400000-0x0000000000440000-memory.dmp upx behavioral2/memory/4588-157-0x0000000000400000-0x0000000000440000-memory.dmp upx behavioral2/memory/4588-158-0x0000000000400000-0x0000000000440000-memory.dmp upx behavioral2/memory/4588-159-0x0000000000400000-0x0000000000440000-memory.dmp upx behavioral2/memory/4588-160-0x0000000000400000-0x0000000000440000-memory.dmp upx behavioral2/memory/4588-161-0x0000000000400000-0x0000000000440000-memory.dmp upx behavioral2/memory/4588-162-0x0000000000400000-0x0000000000440000-memory.dmp upx behavioral2/memory/4588-163-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\px8CA.tmp rundll32mgr.exe File created C:\Program Files (x86)\Microsoft\WaterMark.exe rundll32mgr.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe rundll32mgr.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3516 4276 WerFault.exe 82 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "651530898" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "648562131" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31001152" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31001152" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "651686928" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31001152" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "377184805" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31001152" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{46E204F9-7633-11ED-AECB-520B3B914C01} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "648562131" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 4588 WaterMark.exe 4588 WaterMark.exe 4588 WaterMark.exe 4588 WaterMark.exe 4588 WaterMark.exe 4588 WaterMark.exe 4588 WaterMark.exe 4588 WaterMark.exe 4588 WaterMark.exe 4588 WaterMark.exe 4588 WaterMark.exe 4588 WaterMark.exe 4588 WaterMark.exe 4588 WaterMark.exe 4588 WaterMark.exe 4588 WaterMark.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4588 WaterMark.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3912 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3912 iexplore.exe 3912 iexplore.exe 208 IEXPLORE.EXE 208 IEXPLORE.EXE 208 IEXPLORE.EXE 208 IEXPLORE.EXE -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3856 rundll32mgr.exe 4588 WaterMark.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1864 wrote to memory of 5056 1864 rundll32.exe 79 PID 1864 wrote to memory of 5056 1864 rundll32.exe 79 PID 1864 wrote to memory of 5056 1864 rundll32.exe 79 PID 5056 wrote to memory of 3856 5056 rundll32.exe 80 PID 5056 wrote to memory of 3856 5056 rundll32.exe 80 PID 5056 wrote to memory of 3856 5056 rundll32.exe 80 PID 3856 wrote to memory of 4588 3856 rundll32mgr.exe 81 PID 3856 wrote to memory of 4588 3856 rundll32mgr.exe 81 PID 3856 wrote to memory of 4588 3856 rundll32mgr.exe 81 PID 4588 wrote to memory of 4276 4588 WaterMark.exe 82 PID 4588 wrote to memory of 4276 4588 WaterMark.exe 82 PID 4588 wrote to memory of 4276 4588 WaterMark.exe 82 PID 4588 wrote to memory of 4276 4588 WaterMark.exe 82 PID 4588 wrote to memory of 4276 4588 WaterMark.exe 82 PID 4588 wrote to memory of 4276 4588 WaterMark.exe 82 PID 4588 wrote to memory of 4276 4588 WaterMark.exe 82 PID 4588 wrote to memory of 4276 4588 WaterMark.exe 82 PID 4588 wrote to memory of 4276 4588 WaterMark.exe 82 PID 4588 wrote to memory of 3912 4588 WaterMark.exe 85 PID 4588 wrote to memory of 3912 4588 WaterMark.exe 85 PID 4588 wrote to memory of 4540 4588 WaterMark.exe 86 PID 4588 wrote to memory of 4540 4588 WaterMark.exe 86 PID 3912 wrote to memory of 208 3912 iexplore.exe 88 PID 3912 wrote to memory of 208 3912 iexplore.exe 88 PID 3912 wrote to memory of 208 3912 iexplore.exe 88
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\87be197e7bbaf9470632ac5d501ddbc28bc2cc44a528fcd0151d5361f6fea1ff.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\87be197e7bbaf9470632ac5d501ddbc28bc2cc44a528fcd0151d5361f6fea1ff.dll,#12⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe5⤵PID:4276
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4276 -s 2086⤵
- Program crash
PID:3516
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3912 CREDAT:17410 /prefetch:26⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:208
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Modifies Internet Explorer settings
PID:4540
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4276 -ip 42761⤵PID:1648
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5926010db02a1f272cc0f2cfe2e96f001
SHA17211fe3c943c9c3e9c0b78879a5b7cdf86bcc2bb
SHA2561bbcf3c537e0eb0c5023eb15fdb45bcded037c248818e9b3ca9dcd1931fa1581
SHA512e58032e57888bc677febdcbbe0ed79564c05f0e703857278c8ac80d50706a55af07941bbf0b91fd6b31ce00c2e08ef0657e0606d2df2f716fd532f81660f9e16
-
Filesize
92KB
MD5926010db02a1f272cc0f2cfe2e96f001
SHA17211fe3c943c9c3e9c0b78879a5b7cdf86bcc2bb
SHA2561bbcf3c537e0eb0c5023eb15fdb45bcded037c248818e9b3ca9dcd1931fa1581
SHA512e58032e57888bc677febdcbbe0ed79564c05f0e703857278c8ac80d50706a55af07941bbf0b91fd6b31ce00c2e08ef0657e0606d2df2f716fd532f81660f9e16
-
Filesize
92KB
MD5926010db02a1f272cc0f2cfe2e96f001
SHA17211fe3c943c9c3e9c0b78879a5b7cdf86bcc2bb
SHA2561bbcf3c537e0eb0c5023eb15fdb45bcded037c248818e9b3ca9dcd1931fa1581
SHA512e58032e57888bc677febdcbbe0ed79564c05f0e703857278c8ac80d50706a55af07941bbf0b91fd6b31ce00c2e08ef0657e0606d2df2f716fd532f81660f9e16
-
Filesize
92KB
MD5926010db02a1f272cc0f2cfe2e96f001
SHA17211fe3c943c9c3e9c0b78879a5b7cdf86bcc2bb
SHA2561bbcf3c537e0eb0c5023eb15fdb45bcded037c248818e9b3ca9dcd1931fa1581
SHA512e58032e57888bc677febdcbbe0ed79564c05f0e703857278c8ac80d50706a55af07941bbf0b91fd6b31ce00c2e08ef0657e0606d2df2f716fd532f81660f9e16