Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
154s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 03:57
Static task
static1
Behavioral task
behavioral1
Sample
0da34ec93538d3074163083dad3351a2.exe
Resource
win7-20231215-en
General
-
Target
0da34ec93538d3074163083dad3351a2.exe
-
Size
97KB
-
MD5
0da34ec93538d3074163083dad3351a2
-
SHA1
23018642d30d09444a74ef11721e3eda0f4ec71a
-
SHA256
97f29ffb8c19657ae617866c01d5574b4ba5cd64ea32d40df54ecc22d2212e88
-
SHA512
c23f1138289e52bdfeea40720cc3ec9faf434e6ac00e97d2efc7ccd9fdfd3fdc4c578fb056228aca220990e8293fa5aa5a835bffbd369767f1cf3251b0bf4295
-
SSDEEP
768:L06R0UKzOgnKqGR7//GPc0LOBhvBrHks3IiyhDYQbGmxlNaM+WGa1wuxnzgOYw98:ZR0vxn3Pc0LCH9MtbvabUDzJYWu3B
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,c:\\program files (x86)\\microsoft\\watermark.exe" svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2740 WaterMark.exe -
Loads dropped DLL 2 IoCs
pid Process 1536 0da34ec93538d3074163083dad3351a2.exe 1536 0da34ec93538d3074163083dad3351a2.exe -
resource yara_rule behavioral1/memory/1536-2-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1536-3-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1536-5-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1536-9-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1536-8-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1536-0-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1536-10-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2740-22-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/2740-30-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2740-269-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2740-435-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\dmlconf.dat svchost.exe File opened for modification C:\Windows\SysWOW64\dmlconf.dat svchost.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jfxmedia.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\orbd.exe svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\tiptsf.dll svchost.exe File opened for modification C:\Program Files\Internet Explorer\ieinstal.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\appletviewer.exe svchost.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\msdasqlr.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\html\cpyr.htm svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\dt_socket.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\zip.dll svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\mojo_core.dll svchost.exe File opened for modification C:\Program Files\Internet Explorer\Timeline.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmic.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jp2iexp.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\plugin2\npjp2.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Stars.htm svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\kinit.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\dtplugin\npdeployJava1.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\j2pcsc.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\about.html svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\about.html svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\IpsPlugin.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\tabskb.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\MSOXMLMF.DLL svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\epl-v10.html svchost.exe File opened for modification C:\Program Files\Common Files\System\msadc\msdaremr.dll svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\d3dcompiler_47.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javac.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jvisualvm.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\tnameserv.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jawt.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jsoundds.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ssv.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Roses.htm svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VC\msdia90.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javafxpackager.exe svchost.exe File opened for modification C:\Program Files\Common Files\System\msadc\msadcf.dll svchost.exe File opened for modification C:\Program Files\Common Files\System\msadc\msaddsr.dll svchost.exe File opened for modification C:\Program Files\DVD Maker\OmdBase.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\w2k_lsa_auth.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\license.html svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.help_2.0.102.v20141007-2301\epl-v10.html svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\olh.htm svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Hand Prints.htm svchost.exe File opened for modification C:\Program Files\Internet Explorer\Timeline_is.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\gstreamer-lite.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ssvagent.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\epl-v10.html svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\px58E9.tmp 0da34ec93538d3074163083dad3351a2.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\VSTOInstaller.exe svchost.exe File opened for modification C:\Program Files\Common Files\System\msadc\msadco.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\WindowsAccessBridge-64.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\mshwgst.dll svchost.exe File opened for modification C:\Program Files\Common Files\System\msadc\msdfmap.dll svchost.exe File opened for modification C:\Program Files\Internet Explorer\DiagnosticsHub.DataWarehouse.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javap.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jconsole.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\olh001.htm svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\mshwjpn.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\tipresx.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\MSOXEV.DLL svchost.exe -
Suspicious behavior: EnumeratesProcesses 34 IoCs
pid Process 2740 WaterMark.exe 2740 WaterMark.exe 2740 WaterMark.exe 2740 WaterMark.exe 2740 WaterMark.exe 2740 WaterMark.exe 2740 WaterMark.exe 2740 WaterMark.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2740 WaterMark.exe Token: SeDebugPrivilege 2480 svchost.exe Token: SeDebugPrivilege 2740 WaterMark.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1536 0da34ec93538d3074163083dad3351a2.exe 2740 WaterMark.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1536 wrote to memory of 2740 1536 0da34ec93538d3074163083dad3351a2.exe 28 PID 1536 wrote to memory of 2740 1536 0da34ec93538d3074163083dad3351a2.exe 28 PID 1536 wrote to memory of 2740 1536 0da34ec93538d3074163083dad3351a2.exe 28 PID 1536 wrote to memory of 2740 1536 0da34ec93538d3074163083dad3351a2.exe 28 PID 2740 wrote to memory of 2568 2740 WaterMark.exe 29 PID 2740 wrote to memory of 2568 2740 WaterMark.exe 29 PID 2740 wrote to memory of 2568 2740 WaterMark.exe 29 PID 2740 wrote to memory of 2568 2740 WaterMark.exe 29 PID 2740 wrote to memory of 2568 2740 WaterMark.exe 29 PID 2740 wrote to memory of 2568 2740 WaterMark.exe 29 PID 2740 wrote to memory of 2568 2740 WaterMark.exe 29 PID 2740 wrote to memory of 2568 2740 WaterMark.exe 29 PID 2740 wrote to memory of 2568 2740 WaterMark.exe 29 PID 2740 wrote to memory of 2568 2740 WaterMark.exe 29 PID 2740 wrote to memory of 2480 2740 WaterMark.exe 30 PID 2740 wrote to memory of 2480 2740 WaterMark.exe 30 PID 2740 wrote to memory of 2480 2740 WaterMark.exe 30 PID 2740 wrote to memory of 2480 2740 WaterMark.exe 30 PID 2740 wrote to memory of 2480 2740 WaterMark.exe 30 PID 2740 wrote to memory of 2480 2740 WaterMark.exe 30 PID 2740 wrote to memory of 2480 2740 WaterMark.exe 30 PID 2740 wrote to memory of 2480 2740 WaterMark.exe 30 PID 2740 wrote to memory of 2480 2740 WaterMark.exe 30 PID 2740 wrote to memory of 2480 2740 WaterMark.exe 30 PID 2480 wrote to memory of 260 2480 svchost.exe 5 PID 2480 wrote to memory of 260 2480 svchost.exe 5 PID 2480 wrote to memory of 260 2480 svchost.exe 5 PID 2480 wrote to memory of 260 2480 svchost.exe 5 PID 2480 wrote to memory of 260 2480 svchost.exe 5 PID 2480 wrote to memory of 340 2480 svchost.exe 3 PID 2480 wrote to memory of 340 2480 svchost.exe 3 PID 2480 wrote to memory of 340 2480 svchost.exe 3 PID 2480 wrote to memory of 340 2480 svchost.exe 3 PID 2480 wrote to memory of 340 2480 svchost.exe 3 PID 2480 wrote to memory of 376 2480 svchost.exe 2 PID 2480 wrote to memory of 376 2480 svchost.exe 2 PID 2480 wrote to memory of 376 2480 svchost.exe 2 PID 2480 wrote to memory of 376 2480 svchost.exe 2 PID 2480 wrote to memory of 376 2480 svchost.exe 2 PID 2480 wrote to memory of 384 2480 svchost.exe 1 PID 2480 wrote to memory of 384 2480 svchost.exe 1 PID 2480 wrote to memory of 384 2480 svchost.exe 1 PID 2480 wrote to memory of 384 2480 svchost.exe 1 PID 2480 wrote to memory of 384 2480 svchost.exe 1 PID 2480 wrote to memory of 424 2480 svchost.exe 4 PID 2480 wrote to memory of 424 2480 svchost.exe 4 PID 2480 wrote to memory of 424 2480 svchost.exe 4 PID 2480 wrote to memory of 424 2480 svchost.exe 4 PID 2480 wrote to memory of 424 2480 svchost.exe 4 PID 2480 wrote to memory of 468 2480 svchost.exe 6 PID 2480 wrote to memory of 468 2480 svchost.exe 6 PID 2480 wrote to memory of 468 2480 svchost.exe 6 PID 2480 wrote to memory of 468 2480 svchost.exe 6 PID 2480 wrote to memory of 468 2480 svchost.exe 6 PID 2480 wrote to memory of 484 2480 svchost.exe 7 PID 2480 wrote to memory of 484 2480 svchost.exe 7 PID 2480 wrote to memory of 484 2480 svchost.exe 7 PID 2480 wrote to memory of 484 2480 svchost.exe 7 PID 2480 wrote to memory of 484 2480 svchost.exe 7 PID 2480 wrote to memory of 492 2480 svchost.exe 8 PID 2480 wrote to memory of 492 2480 svchost.exe 8 PID 2480 wrote to memory of 492 2480 svchost.exe 8 PID 2480 wrote to memory of 492 2480 svchost.exe 8 PID 2480 wrote to memory of 492 2480 svchost.exe 8
Processes
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:384
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe2⤵PID:468
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch3⤵PID:608
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -Embedding4⤵PID:1208
-
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted3⤵PID:772
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS3⤵PID:684
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"3⤵PID:1120
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork3⤵PID:1076
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe3⤵PID:544
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService3⤵PID:300
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService3⤵PID:968
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs3⤵PID:844
-
C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R4⤵PID:1604
-
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted3⤵PID:816
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation3⤵PID:2436
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe3⤵PID:2084
-
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe2⤵PID:484
-
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:492
-
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:376
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:340
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:424
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe1⤵PID:260
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1184
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\0da34ec93538d3074163083dad3351a2.exe"C:\Users\Admin\AppData\Local\Temp\0da34ec93538d3074163083dad3351a2.exe"2⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe4⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Drops file in Program Files directory
PID:2568
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2480
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\epl-v10.html
Filesize208KB
MD5de5916ae1de5fa5e9cb708c7a891b96c
SHA15c2af9d3650963cc73e2ebfd65d85cee3dfb1edb
SHA256fb3141b8f705c42477de399a40a6d3e2154309a81d7d693057de72cf0a123b64
SHA5121856f2885bd562dc4f6d39529f622c77534547d50cc2f1bec3e7cbe4f9002975efa1f6adecaeef40406d3505a3b2dde1ebb84d120b345c0b000616ac52c4029a
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\license.html
Filesize204KB
MD5b596da81e83cb11dd7b0cae7570c750f
SHA1dc72a2afada0dfac399b7543b8b5b63e3eeecfab
SHA2564bb0dcb54ccbf0eeacfaf30d973240d98257edd9b50f63188f6dc4c1a75ab845
SHA51201b57832eff915b389dd8b713c4ec12b454168e61b24b439495aede87e0673bc26959824614c0efdaa3ff766ac13d19aea50d33e7e4b2fd06f3d9b98da277949
-
Filesize
97KB
MD50da34ec93538d3074163083dad3351a2
SHA123018642d30d09444a74ef11721e3eda0f4ec71a
SHA25697f29ffb8c19657ae617866c01d5574b4ba5cd64ea32d40df54ecc22d2212e88
SHA512c23f1138289e52bdfeea40720cc3ec9faf434e6ac00e97d2efc7ccd9fdfd3fdc4c578fb056228aca220990e8293fa5aa5a835bffbd369767f1cf3251b0bf4295