Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 02:31
Static task
static1
Behavioral task
behavioral1
Sample
11c8085ec0bfc6dac3254f7f4c34b7a82f62f6970c65ec063d50db7d527e5be0.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
11c8085ec0bfc6dac3254f7f4c34b7a82f62f6970c65ec063d50db7d527e5be0.dll
Resource
win10v2004-20221111-en
General
-
Target
11c8085ec0bfc6dac3254f7f4c34b7a82f62f6970c65ec063d50db7d527e5be0.dll
-
Size
180KB
-
MD5
cd67d3e20a6763b2380627b747d5f450
-
SHA1
37c49e5454bddd0fc8da6c64974f753f2061e83a
-
SHA256
11c8085ec0bfc6dac3254f7f4c34b7a82f62f6970c65ec063d50db7d527e5be0
-
SHA512
e80205c50b62213188c3096aacb73293184f114ebbdf02e9f9cf97122780f7a164a609862586665d49bae29d2a8c4dd8b5f6a646556ed055a2453dc7b8f8f617
-
SSDEEP
3072:Cn4cV8gf2u41Z5tKlI1I+hcj0B/pTBpwtqrFZz63vB24FXnHKP:I4y8gOl2+6A20BtXfWvBlFXnHKP
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,c:\\program files (x86)\\microsoft\\watermark.exe" svchost.exe -
Executes dropped EXE 2 IoCs
pid Process 1624 rundll32Srv.exe 552 WaterMark.exe -
resource yara_rule behavioral1/files/0x0008000000005c51-56.dat upx behavioral1/files/0x0008000000005c51-57.dat upx behavioral1/files/0x0008000000005c51-59.dat upx behavioral1/memory/1624-60-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/files/0x0008000000005c51-61.dat upx behavioral1/files/0x000800000001448d-62.dat upx behavioral1/files/0x000800000001448d-63.dat upx behavioral1/memory/1624-66-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/files/0x000800000001448d-65.dat upx behavioral1/files/0x000800000001448d-67.dat upx behavioral1/memory/552-77-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/552-191-0x0000000000400000-0x000000000045B000-memory.dmp upx -
Loads dropped DLL 4 IoCs
pid Process 1516 rundll32.exe 1516 rundll32.exe 1624 rundll32Srv.exe 1624 rundll32Srv.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32Srv.exe rundll32.exe File created C:\Windows\SysWOW64\dmlconf.dat svchost.exe File opened for modification C:\Windows\SysWOW64\dmlconf.dat svchost.exe -
Drops file in Program Files directory 10 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\px1FD1.tmp rundll32Srv.exe File opened for modification C:\Program Files\7-Zip\7-zip.dll svchost.exe File opened for modification C:\Program Files\7-Zip\7-zip32.dll svchost.exe File opened for modification C:\Program Files\7-Zip\7z.dll svchost.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe svchost.exe File created C:\Program Files (x86)\Microsoft\WaterMark.exe rundll32Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe rundll32Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7z.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7zG.exe svchost.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 552 WaterMark.exe 552 WaterMark.exe 552 WaterMark.exe 552 WaterMark.exe 552 WaterMark.exe 552 WaterMark.exe 552 WaterMark.exe 552 WaterMark.exe 1360 svchost.exe 1360 svchost.exe 1360 svchost.exe 1360 svchost.exe 1360 svchost.exe 1360 svchost.exe 1360 svchost.exe 1360 svchost.exe 1360 svchost.exe 1360 svchost.exe 1360 svchost.exe 1360 svchost.exe 1360 svchost.exe 1360 svchost.exe 1360 svchost.exe 1360 svchost.exe 1360 svchost.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 552 WaterMark.exe Token: SeDebugPrivilege 1360 svchost.exe Token: SeDebugPrivilege 552 WaterMark.exe Token: SeDebugPrivilege 1696 svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1708 wrote to memory of 1516 1708 rundll32.exe 27 PID 1708 wrote to memory of 1516 1708 rundll32.exe 27 PID 1708 wrote to memory of 1516 1708 rundll32.exe 27 PID 1708 wrote to memory of 1516 1708 rundll32.exe 27 PID 1708 wrote to memory of 1516 1708 rundll32.exe 27 PID 1708 wrote to memory of 1516 1708 rundll32.exe 27 PID 1708 wrote to memory of 1516 1708 rundll32.exe 27 PID 1516 wrote to memory of 1624 1516 rundll32.exe 28 PID 1516 wrote to memory of 1624 1516 rundll32.exe 28 PID 1516 wrote to memory of 1624 1516 rundll32.exe 28 PID 1516 wrote to memory of 1624 1516 rundll32.exe 28 PID 1624 wrote to memory of 552 1624 rundll32Srv.exe 29 PID 1624 wrote to memory of 552 1624 rundll32Srv.exe 29 PID 1624 wrote to memory of 552 1624 rundll32Srv.exe 29 PID 1624 wrote to memory of 552 1624 rundll32Srv.exe 29 PID 552 wrote to memory of 1696 552 WaterMark.exe 30 PID 552 wrote to memory of 1696 552 WaterMark.exe 30 PID 552 wrote to memory of 1696 552 WaterMark.exe 30 PID 552 wrote to memory of 1696 552 WaterMark.exe 30 PID 552 wrote to memory of 1696 552 WaterMark.exe 30 PID 552 wrote to memory of 1696 552 WaterMark.exe 30 PID 552 wrote to memory of 1696 552 WaterMark.exe 30 PID 552 wrote to memory of 1696 552 WaterMark.exe 30 PID 552 wrote to memory of 1696 552 WaterMark.exe 30 PID 552 wrote to memory of 1696 552 WaterMark.exe 30 PID 552 wrote to memory of 1360 552 WaterMark.exe 31 PID 552 wrote to memory of 1360 552 WaterMark.exe 31 PID 552 wrote to memory of 1360 552 WaterMark.exe 31 PID 552 wrote to memory of 1360 552 WaterMark.exe 31 PID 552 wrote to memory of 1360 552 WaterMark.exe 31 PID 552 wrote to memory of 1360 552 WaterMark.exe 31 PID 552 wrote to memory of 1360 552 WaterMark.exe 31 PID 552 wrote to memory of 1360 552 WaterMark.exe 31 PID 552 wrote to memory of 1360 552 WaterMark.exe 31 PID 552 wrote to memory of 1360 552 WaterMark.exe 31 PID 1360 wrote to memory of 260 1360 svchost.exe 7 PID 1360 wrote to memory of 260 1360 svchost.exe 7 PID 1360 wrote to memory of 260 1360 svchost.exe 7 PID 1360 wrote to memory of 260 1360 svchost.exe 7 PID 1360 wrote to memory of 260 1360 svchost.exe 7 PID 1360 wrote to memory of 332 1360 svchost.exe 6 PID 1360 wrote to memory of 332 1360 svchost.exe 6 PID 1360 wrote to memory of 332 1360 svchost.exe 6 PID 1360 wrote to memory of 332 1360 svchost.exe 6 PID 1360 wrote to memory of 332 1360 svchost.exe 6 PID 1360 wrote to memory of 368 1360 svchost.exe 5 PID 1360 wrote to memory of 368 1360 svchost.exe 5 PID 1360 wrote to memory of 368 1360 svchost.exe 5 PID 1360 wrote to memory of 368 1360 svchost.exe 5 PID 1360 wrote to memory of 368 1360 svchost.exe 5 PID 1360 wrote to memory of 380 1360 svchost.exe 4 PID 1360 wrote to memory of 380 1360 svchost.exe 4 PID 1360 wrote to memory of 380 1360 svchost.exe 4 PID 1360 wrote to memory of 380 1360 svchost.exe 4 PID 1360 wrote to memory of 380 1360 svchost.exe 4 PID 1360 wrote to memory of 416 1360 svchost.exe 3 PID 1360 wrote to memory of 416 1360 svchost.exe 3 PID 1360 wrote to memory of 416 1360 svchost.exe 3 PID 1360 wrote to memory of 416 1360 svchost.exe 3 PID 1360 wrote to memory of 416 1360 svchost.exe 3 PID 1360 wrote to memory of 464 1360 svchost.exe 2 PID 1360 wrote to memory of 464 1360 svchost.exe 2 PID 1360 wrote to memory of 464 1360 svchost.exe 2 PID 1360 wrote to memory of 464 1360 svchost.exe 2
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:472
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵PID:464
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵PID:672
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵PID:808
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"3⤵PID:1180
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵PID:844
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:756
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵PID:884
-
\\?\C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R3⤵PID:1132
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵PID:328
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵PID:592
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵PID:932
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵PID:1080
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵PID:1116
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵PID:1640
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵PID:1756
-
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:416
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:380
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:368
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:480
-
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:332
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe1⤵PID:260
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1236
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\11c8085ec0bfc6dac3254f7f4c34b7a82f62f6970c65ec063d50db7d527e5be0.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\11c8085ec0bfc6dac3254f7f4c34b7a82f62f6970c65ec063d50db7d527e5be0.dll,#13⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\SysWOW64\rundll32Srv.exeC:\Windows\SysWOW64\rundll32Srv.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe6⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:1696
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1360
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD591b07c6f70654a26ca1cd8cde6fb2a7e
SHA1789629859ed76191432fd7ab40cfa0487b580a6e
SHA25637417b870c644d70c09c773b828dbb451e33d4e74df2f66d9698ae090d240d15
SHA512077b62709e40c66304429acae5cccb953affa59791f2139d0b0e3e8a4610d38aa5dd6a44d9c857220245a9e746fb980a5dd0966d8b2795313ca7b6deeafd1dd2
-
Filesize
90KB
MD591b07c6f70654a26ca1cd8cde6fb2a7e
SHA1789629859ed76191432fd7ab40cfa0487b580a6e
SHA25637417b870c644d70c09c773b828dbb451e33d4e74df2f66d9698ae090d240d15
SHA512077b62709e40c66304429acae5cccb953affa59791f2139d0b0e3e8a4610d38aa5dd6a44d9c857220245a9e746fb980a5dd0966d8b2795313ca7b6deeafd1dd2
-
Filesize
90KB
MD591b07c6f70654a26ca1cd8cde6fb2a7e
SHA1789629859ed76191432fd7ab40cfa0487b580a6e
SHA25637417b870c644d70c09c773b828dbb451e33d4e74df2f66d9698ae090d240d15
SHA512077b62709e40c66304429acae5cccb953affa59791f2139d0b0e3e8a4610d38aa5dd6a44d9c857220245a9e746fb980a5dd0966d8b2795313ca7b6deeafd1dd2
-
Filesize
90KB
MD591b07c6f70654a26ca1cd8cde6fb2a7e
SHA1789629859ed76191432fd7ab40cfa0487b580a6e
SHA25637417b870c644d70c09c773b828dbb451e33d4e74df2f66d9698ae090d240d15
SHA512077b62709e40c66304429acae5cccb953affa59791f2139d0b0e3e8a4610d38aa5dd6a44d9c857220245a9e746fb980a5dd0966d8b2795313ca7b6deeafd1dd2
-
Filesize
90KB
MD591b07c6f70654a26ca1cd8cde6fb2a7e
SHA1789629859ed76191432fd7ab40cfa0487b580a6e
SHA25637417b870c644d70c09c773b828dbb451e33d4e74df2f66d9698ae090d240d15
SHA512077b62709e40c66304429acae5cccb953affa59791f2139d0b0e3e8a4610d38aa5dd6a44d9c857220245a9e746fb980a5dd0966d8b2795313ca7b6deeafd1dd2
-
Filesize
90KB
MD591b07c6f70654a26ca1cd8cde6fb2a7e
SHA1789629859ed76191432fd7ab40cfa0487b580a6e
SHA25637417b870c644d70c09c773b828dbb451e33d4e74df2f66d9698ae090d240d15
SHA512077b62709e40c66304429acae5cccb953affa59791f2139d0b0e3e8a4610d38aa5dd6a44d9c857220245a9e746fb980a5dd0966d8b2795313ca7b6deeafd1dd2
-
Filesize
90KB
MD591b07c6f70654a26ca1cd8cde6fb2a7e
SHA1789629859ed76191432fd7ab40cfa0487b580a6e
SHA25637417b870c644d70c09c773b828dbb451e33d4e74df2f66d9698ae090d240d15
SHA512077b62709e40c66304429acae5cccb953affa59791f2139d0b0e3e8a4610d38aa5dd6a44d9c857220245a9e746fb980a5dd0966d8b2795313ca7b6deeafd1dd2
-
Filesize
90KB
MD591b07c6f70654a26ca1cd8cde6fb2a7e
SHA1789629859ed76191432fd7ab40cfa0487b580a6e
SHA25637417b870c644d70c09c773b828dbb451e33d4e74df2f66d9698ae090d240d15
SHA512077b62709e40c66304429acae5cccb953affa59791f2139d0b0e3e8a4610d38aa5dd6a44d9c857220245a9e746fb980a5dd0966d8b2795313ca7b6deeafd1dd2