Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 02:28
Static task
static1
Behavioral task
behavioral1
Sample
2761ead814f321b5a5e1d1f51c0e0a28063810d253c2722512667a13b723b42b.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2761ead814f321b5a5e1d1f51c0e0a28063810d253c2722512667a13b723b42b.dll
Resource
win10v2004-20220812-en
General
-
Target
2761ead814f321b5a5e1d1f51c0e0a28063810d253c2722512667a13b723b42b.dll
-
Size
472KB
-
MD5
d65db2e450b05e2d639f3a680b6b7830
-
SHA1
56935ce9001c2a31a573fdf2a7c6bd9cb8a43bc1
-
SHA256
2761ead814f321b5a5e1d1f51c0e0a28063810d253c2722512667a13b723b42b
-
SHA512
5b127445307aa094d39aa019966a2222f3a130465d98c205634c7706ea8b1618a392591dd0cd0c2bd51b4cc0c1480ef1b28e769ea1ae6880da73064c376bac99
-
SSDEEP
12288:sehnaNPpSVZmNxRCwnwm3W3OHIIf5Rm8iV:seh0PpS6NxNnwYeOHXX7
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,c:\\program files (x86)\\microsoft\\watermark.exe" svchost.exe -
Executes dropped EXE 2 IoCs
pid Process 896 rundll32Srv.exe 1468 WaterMark.exe -
resource yara_rule behavioral1/files/0x0007000000005c50-56.dat upx behavioral1/memory/2008-58-0x0000000000200000-0x000000000025B000-memory.dmp upx behavioral1/files/0x0007000000005c50-59.dat upx behavioral1/files/0x0007000000005c50-61.dat upx behavioral1/files/0x0007000000005c50-62.dat upx behavioral1/memory/896-65-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/files/0x000b0000000122cc-66.dat upx behavioral1/files/0x000b0000000122cc-69.dat upx behavioral1/files/0x000b0000000122cc-67.dat upx behavioral1/files/0x000b0000000122cc-70.dat upx behavioral1/memory/1468-71-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/1468-209-0x0000000000400000-0x000000000045B000-memory.dmp upx -
Loads dropped DLL 4 IoCs
pid Process 2008 rundll32.exe 2008 rundll32.exe 896 rundll32Srv.exe 896 rundll32Srv.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32Srv.exe rundll32.exe File created C:\Windows\SysWOW64\dmlconf.dat svchost.exe File opened for modification C:\Windows\SysWOW64\dmlconf.dat svchost.exe -
Drops file in Program Files directory 10 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\px6C99.tmp rundll32Srv.exe File created C:\Program Files (x86)\Microsoft\WaterMark.exe rundll32Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe rundll32Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7-zip32.dll svchost.exe File opened for modification C:\Program Files\7-Zip\7-zip.dll svchost.exe File opened for modification C:\Program Files\7-Zip\7z.dll svchost.exe File opened for modification C:\Program Files\7-Zip\7z.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7zG.exe svchost.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2016 2008 WerFault.exe 26 -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 1468 WaterMark.exe 1468 WaterMark.exe 1468 WaterMark.exe 1468 WaterMark.exe 1468 WaterMark.exe 1468 WaterMark.exe 1468 WaterMark.exe 1468 WaterMark.exe 560 svchost.exe 560 svchost.exe 560 svchost.exe 560 svchost.exe 560 svchost.exe 560 svchost.exe 560 svchost.exe 560 svchost.exe 560 svchost.exe 560 svchost.exe 560 svchost.exe 560 svchost.exe 560 svchost.exe 560 svchost.exe 560 svchost.exe 560 svchost.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1468 WaterMark.exe Token: SeDebugPrivilege 560 svchost.exe Token: SeDebugPrivilege 2008 rundll32.exe Token: SeDebugPrivilege 2016 WerFault.exe Token: SeDebugPrivilege 1468 WaterMark.exe Token: SeDebugPrivilege 1124 svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1220 wrote to memory of 2008 1220 rundll32.exe 26 PID 1220 wrote to memory of 2008 1220 rundll32.exe 26 PID 1220 wrote to memory of 2008 1220 rundll32.exe 26 PID 1220 wrote to memory of 2008 1220 rundll32.exe 26 PID 1220 wrote to memory of 2008 1220 rundll32.exe 26 PID 1220 wrote to memory of 2008 1220 rundll32.exe 26 PID 1220 wrote to memory of 2008 1220 rundll32.exe 26 PID 2008 wrote to memory of 896 2008 rundll32.exe 27 PID 2008 wrote to memory of 896 2008 rundll32.exe 27 PID 2008 wrote to memory of 896 2008 rundll32.exe 27 PID 2008 wrote to memory of 896 2008 rundll32.exe 27 PID 2008 wrote to memory of 2016 2008 rundll32.exe 28 PID 2008 wrote to memory of 2016 2008 rundll32.exe 28 PID 2008 wrote to memory of 2016 2008 rundll32.exe 28 PID 2008 wrote to memory of 2016 2008 rundll32.exe 28 PID 896 wrote to memory of 1468 896 rundll32Srv.exe 29 PID 896 wrote to memory of 1468 896 rundll32Srv.exe 29 PID 896 wrote to memory of 1468 896 rundll32Srv.exe 29 PID 896 wrote to memory of 1468 896 rundll32Srv.exe 29 PID 1468 wrote to memory of 1124 1468 WaterMark.exe 30 PID 1468 wrote to memory of 1124 1468 WaterMark.exe 30 PID 1468 wrote to memory of 1124 1468 WaterMark.exe 30 PID 1468 wrote to memory of 1124 1468 WaterMark.exe 30 PID 1468 wrote to memory of 1124 1468 WaterMark.exe 30 PID 1468 wrote to memory of 1124 1468 WaterMark.exe 30 PID 1468 wrote to memory of 1124 1468 WaterMark.exe 30 PID 1468 wrote to memory of 1124 1468 WaterMark.exe 30 PID 1468 wrote to memory of 1124 1468 WaterMark.exe 30 PID 1468 wrote to memory of 1124 1468 WaterMark.exe 30 PID 1468 wrote to memory of 560 1468 WaterMark.exe 31 PID 1468 wrote to memory of 560 1468 WaterMark.exe 31 PID 1468 wrote to memory of 560 1468 WaterMark.exe 31 PID 1468 wrote to memory of 560 1468 WaterMark.exe 31 PID 1468 wrote to memory of 560 1468 WaterMark.exe 31 PID 1468 wrote to memory of 560 1468 WaterMark.exe 31 PID 1468 wrote to memory of 560 1468 WaterMark.exe 31 PID 1468 wrote to memory of 560 1468 WaterMark.exe 31 PID 1468 wrote to memory of 560 1468 WaterMark.exe 31 PID 1468 wrote to memory of 560 1468 WaterMark.exe 31 PID 560 wrote to memory of 260 560 svchost.exe 25 PID 560 wrote to memory of 260 560 svchost.exe 25 PID 560 wrote to memory of 260 560 svchost.exe 25 PID 560 wrote to memory of 260 560 svchost.exe 25 PID 560 wrote to memory of 260 560 svchost.exe 25 PID 560 wrote to memory of 332 560 svchost.exe 24 PID 560 wrote to memory of 332 560 svchost.exe 24 PID 560 wrote to memory of 332 560 svchost.exe 24 PID 560 wrote to memory of 332 560 svchost.exe 24 PID 560 wrote to memory of 332 560 svchost.exe 24 PID 560 wrote to memory of 368 560 svchost.exe 23 PID 560 wrote to memory of 368 560 svchost.exe 23 PID 560 wrote to memory of 368 560 svchost.exe 23 PID 560 wrote to memory of 368 560 svchost.exe 23 PID 560 wrote to memory of 368 560 svchost.exe 23 PID 560 wrote to memory of 376 560 svchost.exe 22 PID 560 wrote to memory of 376 560 svchost.exe 22 PID 560 wrote to memory of 376 560 svchost.exe 22 PID 560 wrote to memory of 376 560 svchost.exe 22 PID 560 wrote to memory of 376 560 svchost.exe 22 PID 560 wrote to memory of 416 560 svchost.exe 3 PID 560 wrote to memory of 416 560 svchost.exe 3 PID 560 wrote to memory of 416 560 svchost.exe 3 PID 560 wrote to memory of 416 560 svchost.exe 3 PID 560 wrote to memory of 416 560 svchost.exe 3
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:476
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵PID:460
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵PID:868
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵PID:956
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵PID:1112
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵PID:1164
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵PID:1048
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵PID:676
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵PID:340
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵PID:824
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵PID:792
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:732
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵PID:660
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵PID:580
-
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:416
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1284
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2761ead814f321b5a5e1d1f51c0e0a28063810d253c2722512667a13b723b42b.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2761ead814f321b5a5e1d1f51c0e0a28063810d253c2722512667a13b723b42b.dll,#13⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\rundll32Srv.exeC:\Windows\SysWOW64\rundll32Srv.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe6⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:1124
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:560
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2008 -s 2284⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2016
-
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1232
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe1⤵PID:484
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:376
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:368
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:332
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe1⤵PID:260
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD5d42b1312a4843705ddb9c9ee6ac1bd2d
SHA1cbef4dc54b47f09d0ed37200694d62f19d0b249a
SHA256aa0c1e6acd98bae8e3f3ef38c3d687571ffcea30b2d237fa5015ba9c846afada
SHA512c8c5c9e5b0a713b754794ba6b24145bd05132b6dde919d28bedb63c600a0e557ce801e5624f18a9ddd7e6a90daa5bdfdac7d0e778fdde1dc6924b9b5f5dfacb6
-
Filesize
90KB
MD5d42b1312a4843705ddb9c9ee6ac1bd2d
SHA1cbef4dc54b47f09d0ed37200694d62f19d0b249a
SHA256aa0c1e6acd98bae8e3f3ef38c3d687571ffcea30b2d237fa5015ba9c846afada
SHA512c8c5c9e5b0a713b754794ba6b24145bd05132b6dde919d28bedb63c600a0e557ce801e5624f18a9ddd7e6a90daa5bdfdac7d0e778fdde1dc6924b9b5f5dfacb6
-
Filesize
90KB
MD5d42b1312a4843705ddb9c9ee6ac1bd2d
SHA1cbef4dc54b47f09d0ed37200694d62f19d0b249a
SHA256aa0c1e6acd98bae8e3f3ef38c3d687571ffcea30b2d237fa5015ba9c846afada
SHA512c8c5c9e5b0a713b754794ba6b24145bd05132b6dde919d28bedb63c600a0e557ce801e5624f18a9ddd7e6a90daa5bdfdac7d0e778fdde1dc6924b9b5f5dfacb6
-
Filesize
90KB
MD5d42b1312a4843705ddb9c9ee6ac1bd2d
SHA1cbef4dc54b47f09d0ed37200694d62f19d0b249a
SHA256aa0c1e6acd98bae8e3f3ef38c3d687571ffcea30b2d237fa5015ba9c846afada
SHA512c8c5c9e5b0a713b754794ba6b24145bd05132b6dde919d28bedb63c600a0e557ce801e5624f18a9ddd7e6a90daa5bdfdac7d0e778fdde1dc6924b9b5f5dfacb6
-
Filesize
90KB
MD5d42b1312a4843705ddb9c9ee6ac1bd2d
SHA1cbef4dc54b47f09d0ed37200694d62f19d0b249a
SHA256aa0c1e6acd98bae8e3f3ef38c3d687571ffcea30b2d237fa5015ba9c846afada
SHA512c8c5c9e5b0a713b754794ba6b24145bd05132b6dde919d28bedb63c600a0e557ce801e5624f18a9ddd7e6a90daa5bdfdac7d0e778fdde1dc6924b9b5f5dfacb6
-
Filesize
90KB
MD5d42b1312a4843705ddb9c9ee6ac1bd2d
SHA1cbef4dc54b47f09d0ed37200694d62f19d0b249a
SHA256aa0c1e6acd98bae8e3f3ef38c3d687571ffcea30b2d237fa5015ba9c846afada
SHA512c8c5c9e5b0a713b754794ba6b24145bd05132b6dde919d28bedb63c600a0e557ce801e5624f18a9ddd7e6a90daa5bdfdac7d0e778fdde1dc6924b9b5f5dfacb6
-
Filesize
90KB
MD5d42b1312a4843705ddb9c9ee6ac1bd2d
SHA1cbef4dc54b47f09d0ed37200694d62f19d0b249a
SHA256aa0c1e6acd98bae8e3f3ef38c3d687571ffcea30b2d237fa5015ba9c846afada
SHA512c8c5c9e5b0a713b754794ba6b24145bd05132b6dde919d28bedb63c600a0e557ce801e5624f18a9ddd7e6a90daa5bdfdac7d0e778fdde1dc6924b9b5f5dfacb6
-
Filesize
90KB
MD5d42b1312a4843705ddb9c9ee6ac1bd2d
SHA1cbef4dc54b47f09d0ed37200694d62f19d0b249a
SHA256aa0c1e6acd98bae8e3f3ef38c3d687571ffcea30b2d237fa5015ba9c846afada
SHA512c8c5c9e5b0a713b754794ba6b24145bd05132b6dde919d28bedb63c600a0e557ce801e5624f18a9ddd7e6a90daa5bdfdac7d0e778fdde1dc6924b9b5f5dfacb6