Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
3s -
max time network
66s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2024, 20:08 UTC
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
53b233c6c23409aa87d7982565849165.dll
Resource
win7-20231215-en
11 signatures
150 seconds
General
-
Target
53b233c6c23409aa87d7982565849165.dll
-
Size
166KB
-
MD5
53b233c6c23409aa87d7982565849165
-
SHA1
f3b0d0f6869a017892d7838d60fa9738d648d0e5
-
SHA256
f2db305bb87e418623361ca81fc600864d14e270f3b23a4a0248b9ada86c1543
-
SHA512
2f2fa21b020fcc3b9f76b2874c74b0a37cf4c7da96dab5111bc3fa481bd767bcd503a476998fc1d0daf5cb5b2b315124c71486ef33325279670eafd55fdb1ef0
-
SSDEEP
3072:pTU56gVxj27NevROEuPvisOpkTv7L2GQ6uE:G4wRj+qYvW4uE
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2196 regsvr32mgr.exe 4292 WaterMark.exe -
resource yara_rule behavioral2/memory/2196-9-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4292-22-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral2/memory/4292-29-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/2196-15-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/2196-11-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/2196-10-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/2196-12-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/2196-8-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/2196-7-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/2196-6-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4292-39-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4292-40-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\regsvr32mgr.exe regsvr32.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe regsvr32mgr.exe File opened for modification C:\Program Files (x86)\Microsoft\px4556.tmp regsvr32mgr.exe File created C:\Program Files (x86)\Microsoft\WaterMark.exe regsvr32mgr.exe -
Program crash 1 IoCs
pid pid_target Process 3844 4788 WerFault.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 4292 WaterMark.exe 4292 WaterMark.exe 4292 WaterMark.exe 4292 WaterMark.exe 4292 WaterMark.exe 4292 WaterMark.exe 4292 WaterMark.exe 4292 WaterMark.exe 4292 WaterMark.exe 4292 WaterMark.exe 4292 WaterMark.exe 4292 WaterMark.exe 4292 WaterMark.exe 4292 WaterMark.exe 4292 WaterMark.exe 4292 WaterMark.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4292 WaterMark.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2196 regsvr32mgr.exe 4292 WaterMark.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 3452 wrote to memory of 1512 3452 regsvr32.exe 16 PID 3452 wrote to memory of 1512 3452 regsvr32.exe 16 PID 3452 wrote to memory of 1512 3452 regsvr32.exe 16 PID 1512 wrote to memory of 2196 1512 regsvr32.exe 27 PID 1512 wrote to memory of 2196 1512 regsvr32.exe 27 PID 1512 wrote to memory of 2196 1512 regsvr32.exe 27 PID 2196 wrote to memory of 4292 2196 regsvr32mgr.exe 26 PID 2196 wrote to memory of 4292 2196 regsvr32mgr.exe 26 PID 2196 wrote to memory of 4292 2196 regsvr32mgr.exe 26 PID 4292 wrote to memory of 4788 4292 WaterMark.exe 25 PID 4292 wrote to memory of 4788 4292 WaterMark.exe 25 PID 4292 wrote to memory of 4788 4292 WaterMark.exe 25 PID 4292 wrote to memory of 4788 4292 WaterMark.exe 25 PID 4292 wrote to memory of 4788 4292 WaterMark.exe 25 PID 4292 wrote to memory of 4788 4292 WaterMark.exe 25 PID 4292 wrote to memory of 4788 4292 WaterMark.exe 25 PID 4292 wrote to memory of 4788 4292 WaterMark.exe 25 PID 4292 wrote to memory of 4788 4292 WaterMark.exe 25 PID 4292 wrote to memory of 3044 4292 WaterMark.exe 64 PID 4292 wrote to memory of 3044 4292 WaterMark.exe 64 PID 4292 wrote to memory of 2796 4292 WaterMark.exe 65 PID 4292 wrote to memory of 2796 4292 WaterMark.exe 65
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\53b233c6c23409aa87d7982565849165.dll1⤵
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\53b233c6c23409aa87d7982565849165.dll2⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\SysWOW64\regsvr32mgr.exeC:\Windows\SysWOW64\regsvr32mgr.exe3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2196
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4788 -ip 47881⤵PID:4392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4788 -s 2041⤵
- Program crash
PID:3844
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe1⤵PID:4788
-
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵
- Modifies Internet Explorer settings
PID:3044 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3044 CREDAT:17410 /prefetch:23⤵PID:1204
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵
- Modifies Internet Explorer settings
PID:2796 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2796 CREDAT:17410 /prefetch:23⤵PID:3644
-
-
Network
-
Remote address:8.8.8.8:53Request208.194.73.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestg.bing.comIN AResponseg.bing.comIN CNAMEg-bing-com.a-0001.a-msedge.netg-bing-com.a-0001.a-msedge.netIN CNAMEdual-a-0001.a-msedge.netdual-a-0001.a-msedge.netIN A204.79.197.200dual-a-0001.a-msedge.netIN A13.107.21.200
-
Remote address:8.8.8.8:53Requestg.bing.comIN A
-
Remote address:8.8.8.8:53Requestg.bing.comIN A
-
Remote address:8.8.8.8:53Requestg.bing.comIN A
-
Remote address:8.8.8.8:53Request82.117.19.2.in-addr.arpaIN PTRResponse82.117.19.2.in-addr.arpaIN PTRa2-19-117-82deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request6.181.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Requestapi.bing.comIN AResponseapi.bing.comIN CNAMEapi-bing-com.e-0001.e-msedge.netapi-bing-com.e-0001.e-msedge.netIN CNAMEe-0001.e-msedge.nete-0001.e-msedge.netIN A13.107.5.80
-
Remote address:8.8.8.8:53Request241.154.82.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request241.154.82.20.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request241.154.82.20.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request241.154.82.20.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request26.35.223.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request26.35.223.20.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request26.35.223.20.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request11.6.37.23.in-addr.arpaIN PTRResponse11.6.37.23.in-addr.arpaIN PTRa23-37-6-11deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request135.5.97.104.in-addr.arpaIN PTRResponse135.5.97.104.in-addr.arpaIN PTRa104-97-5-135deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request119.110.54.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request161.19.199.152.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request240.221.184.93.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request97.117.19.2.in-addr.arpaIN PTRResponse97.117.19.2.in-addr.arpaIN PTRa2-19-117-97deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request42.218.122.92.in-addr.arpaIN PTRResponse42.218.122.92.in-addr.arpaIN PTRa92-122-218-42deploystaticakamaitechnologiescom
-
72 B 158 B 1 1
DNS Request
208.194.73.20.in-addr.arpa
-
224 B 158 B 4 1
DNS Request
g.bing.com
DNS Request
g.bing.com
DNS Request
g.bing.com
DNS Request
g.bing.com
DNS Response
204.79.197.20013.107.21.200
-
70 B 133 B 1 1
DNS Request
82.117.19.2.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
6.181.190.20.in-addr.arpa
-
146 B 144 B 2 1
DNS Request
95.221.229.192.in-addr.arpa
DNS Request
95.221.229.192.in-addr.arpa
-
58 B 134 B 1 1
DNS Request
api.bing.com
DNS Response
13.107.5.80
-
288 B 158 B 4 1
DNS Request
241.154.82.20.in-addr.arpa
DNS Request
241.154.82.20.in-addr.arpa
DNS Request
241.154.82.20.in-addr.arpa
DNS Request
241.154.82.20.in-addr.arpa
-
213 B 157 B 3 1
DNS Request
26.35.223.20.in-addr.arpa
DNS Request
26.35.223.20.in-addr.arpa
DNS Request
26.35.223.20.in-addr.arpa
-
69 B 131 B 1 1
DNS Request
11.6.37.23.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
135.5.97.104.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
119.110.54.20.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
161.19.199.152.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
240.221.184.93.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
97.117.19.2.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
42.218.122.92.in-addr.arpa