Analysis
-
max time kernel
155s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/10/2022, 04:51
Static task
static1
Behavioral task
behavioral1
Sample
af33d2bd738d3b65244fa013e0efcf945a846c037f4be99d47cb70db35c00be2.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
af33d2bd738d3b65244fa013e0efcf945a846c037f4be99d47cb70db35c00be2.dll
Resource
win10v2004-20220812-en
General
-
Target
af33d2bd738d3b65244fa013e0efcf945a846c037f4be99d47cb70db35c00be2.dll
-
Size
709KB
-
MD5
6890c7c8e3a22b89673e2d323e3be944
-
SHA1
7b0162c17966a8fe2e78327cf73555647ccd861e
-
SHA256
af33d2bd738d3b65244fa013e0efcf945a846c037f4be99d47cb70db35c00be2
-
SHA512
5d3f2d7339e30ff50aa29ded58edf10db91670eddb12d1e265375cf7e547c7cc9900f64bb3cfc20c513ce722048b2d1ccfcaab6ba2ddbc17f121a0fa59622eba
-
SSDEEP
12288:EE7NiOLg18+1/hv5VEipyz7mTWWa8afR2ftuD1xbmiUaWlodYJA0K:EE3+F5GipwuWWpj+bW6dYJLK
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,c:\\program files (x86)\\microsoft\\watermark.exe" svchost.exe -
Executes dropped EXE 2 IoCs
pid Process 916 rundll32mgr.exe 2036 WaterMark.exe -
resource yara_rule behavioral1/memory/916-64-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/916-65-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/916-71-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1656-78-0x0000000074750000-0x0000000074808000-memory.dmp upx behavioral1/memory/2036-82-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/2036-83-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/2036-220-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/2036-221-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Loads dropped DLL 4 IoCs
pid Process 1656 rundll32.exe 1656 rundll32.exe 916 rundll32mgr.exe 916 rundll32mgr.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe File created C:\Windows\SysWOW64\dmlconf.dat svchost.exe File opened for modification C:\Windows\SysWOW64\dmlconf.dat svchost.exe -
Drops file in Program Files directory 10 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\px25E9.tmp rundll32mgr.exe File created C:\Program Files (x86)\Microsoft\WaterMark.exe rundll32mgr.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe rundll32mgr.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7-zip32.dll svchost.exe File opened for modification C:\Program Files\7-Zip\7z.dll svchost.exe File opened for modification C:\Program Files\7-Zip\7z.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7zG.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7-zip.dll svchost.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe svchost.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 956 1656 WerFault.exe 28 -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 2036 WaterMark.exe 2036 WaterMark.exe 2036 WaterMark.exe 2036 WaterMark.exe 2036 WaterMark.exe 2036 WaterMark.exe 2036 WaterMark.exe 2036 WaterMark.exe 1436 svchost.exe 1436 svchost.exe 1436 svchost.exe 1436 svchost.exe 1436 svchost.exe 1436 svchost.exe 1436 svchost.exe 1436 svchost.exe 1436 svchost.exe 1436 svchost.exe 1436 svchost.exe 1436 svchost.exe 1436 svchost.exe 1436 svchost.exe 1436 svchost.exe 1436 svchost.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2036 WaterMark.exe Token: SeDebugPrivilege 1436 svchost.exe Token: SeDebugPrivilege 1656 rundll32.exe Token: SeDebugPrivilege 956 WerFault.exe Token: SeDebugPrivilege 2036 WaterMark.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 916 rundll32mgr.exe 2036 WaterMark.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 688 wrote to memory of 1656 688 rundll32.exe 28 PID 688 wrote to memory of 1656 688 rundll32.exe 28 PID 688 wrote to memory of 1656 688 rundll32.exe 28 PID 688 wrote to memory of 1656 688 rundll32.exe 28 PID 688 wrote to memory of 1656 688 rundll32.exe 28 PID 688 wrote to memory of 1656 688 rundll32.exe 28 PID 688 wrote to memory of 1656 688 rundll32.exe 28 PID 1656 wrote to memory of 916 1656 rundll32.exe 29 PID 1656 wrote to memory of 916 1656 rundll32.exe 29 PID 1656 wrote to memory of 916 1656 rundll32.exe 29 PID 1656 wrote to memory of 916 1656 rundll32.exe 29 PID 1656 wrote to memory of 956 1656 rundll32.exe 30 PID 1656 wrote to memory of 956 1656 rundll32.exe 30 PID 1656 wrote to memory of 956 1656 rundll32.exe 30 PID 1656 wrote to memory of 956 1656 rundll32.exe 30 PID 916 wrote to memory of 2036 916 rundll32mgr.exe 31 PID 916 wrote to memory of 2036 916 rundll32mgr.exe 31 PID 916 wrote to memory of 2036 916 rundll32mgr.exe 31 PID 916 wrote to memory of 2036 916 rundll32mgr.exe 31 PID 2036 wrote to memory of 840 2036 WaterMark.exe 32 PID 2036 wrote to memory of 840 2036 WaterMark.exe 32 PID 2036 wrote to memory of 840 2036 WaterMark.exe 32 PID 2036 wrote to memory of 840 2036 WaterMark.exe 32 PID 2036 wrote to memory of 840 2036 WaterMark.exe 32 PID 2036 wrote to memory of 840 2036 WaterMark.exe 32 PID 2036 wrote to memory of 840 2036 WaterMark.exe 32 PID 2036 wrote to memory of 840 2036 WaterMark.exe 32 PID 2036 wrote to memory of 840 2036 WaterMark.exe 32 PID 2036 wrote to memory of 840 2036 WaterMark.exe 32 PID 2036 wrote to memory of 1436 2036 WaterMark.exe 33 PID 2036 wrote to memory of 1436 2036 WaterMark.exe 33 PID 2036 wrote to memory of 1436 2036 WaterMark.exe 33 PID 2036 wrote to memory of 1436 2036 WaterMark.exe 33 PID 2036 wrote to memory of 1436 2036 WaterMark.exe 33 PID 2036 wrote to memory of 1436 2036 WaterMark.exe 33 PID 2036 wrote to memory of 1436 2036 WaterMark.exe 33 PID 2036 wrote to memory of 1436 2036 WaterMark.exe 33 PID 2036 wrote to memory of 1436 2036 WaterMark.exe 33 PID 2036 wrote to memory of 1436 2036 WaterMark.exe 33 PID 1436 wrote to memory of 260 1436 svchost.exe 26 PID 1436 wrote to memory of 260 1436 svchost.exe 26 PID 1436 wrote to memory of 260 1436 svchost.exe 26 PID 1436 wrote to memory of 260 1436 svchost.exe 26 PID 1436 wrote to memory of 260 1436 svchost.exe 26 PID 1436 wrote to memory of 336 1436 svchost.exe 25 PID 1436 wrote to memory of 336 1436 svchost.exe 25 PID 1436 wrote to memory of 336 1436 svchost.exe 25 PID 1436 wrote to memory of 336 1436 svchost.exe 25 PID 1436 wrote to memory of 336 1436 svchost.exe 25 PID 1436 wrote to memory of 372 1436 svchost.exe 24 PID 1436 wrote to memory of 372 1436 svchost.exe 24 PID 1436 wrote to memory of 372 1436 svchost.exe 24 PID 1436 wrote to memory of 372 1436 svchost.exe 24 PID 1436 wrote to memory of 372 1436 svchost.exe 24 PID 1436 wrote to memory of 384 1436 svchost.exe 4 PID 1436 wrote to memory of 384 1436 svchost.exe 4 PID 1436 wrote to memory of 384 1436 svchost.exe 4 PID 1436 wrote to memory of 384 1436 svchost.exe 4 PID 1436 wrote to memory of 384 1436 svchost.exe 4 PID 1436 wrote to memory of 420 1436 svchost.exe 3 PID 1436 wrote to memory of 420 1436 svchost.exe 3 PID 1436 wrote to memory of 420 1436 svchost.exe 3 PID 1436 wrote to memory of 420 1436 svchost.exe 3 PID 1436 wrote to memory of 420 1436 svchost.exe 3
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:480
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵PID:464
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵PID:596
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe3⤵PID:1944
-
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵PID:1756
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵PID:1676
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵PID:1144
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵PID:1056
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵PID:992
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵PID:284
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵PID:876
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵PID:844
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵PID:804
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:756
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵PID:672
-
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:420
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:384
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1240
-
\\?\C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R1⤵PID:1636
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1272
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\af33d2bd738d3b65244fa013e0efcf945a846c037f4be99d47cb70db35c00be2.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\af33d2bd738d3b65244fa013e0efcf945a846c037f4be99d47cb70db35c00be2.dll,#13⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe6⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Drops file in Program Files directory
PID:840
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1436
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1656 -s 2244⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:956
-
-
-
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe1⤵PID:488
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:372
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:336
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe1⤵PID:260
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
123KB
MD5bfeab24969e80e4fd4362b05f5c54554
SHA1bc2365f8bc9163e0f327e11541e0462395a879ac
SHA256cc900fe27a79e792b7b2547191b65dbadb550b02b1b42d072c06d73096185206
SHA5124c658ed109aa774121820af99c16417c71a2adf0117446ea898ceb2a5e86bd61c0b758023bd0ab33e13c2d91c7c60cb9e5ea26a2d969257c6d26909dbb9da259
-
Filesize
123KB
MD5bfeab24969e80e4fd4362b05f5c54554
SHA1bc2365f8bc9163e0f327e11541e0462395a879ac
SHA256cc900fe27a79e792b7b2547191b65dbadb550b02b1b42d072c06d73096185206
SHA5124c658ed109aa774121820af99c16417c71a2adf0117446ea898ceb2a5e86bd61c0b758023bd0ab33e13c2d91c7c60cb9e5ea26a2d969257c6d26909dbb9da259
-
Filesize
123KB
MD5bfeab24969e80e4fd4362b05f5c54554
SHA1bc2365f8bc9163e0f327e11541e0462395a879ac
SHA256cc900fe27a79e792b7b2547191b65dbadb550b02b1b42d072c06d73096185206
SHA5124c658ed109aa774121820af99c16417c71a2adf0117446ea898ceb2a5e86bd61c0b758023bd0ab33e13c2d91c7c60cb9e5ea26a2d969257c6d26909dbb9da259
-
Filesize
123KB
MD5bfeab24969e80e4fd4362b05f5c54554
SHA1bc2365f8bc9163e0f327e11541e0462395a879ac
SHA256cc900fe27a79e792b7b2547191b65dbadb550b02b1b42d072c06d73096185206
SHA5124c658ed109aa774121820af99c16417c71a2adf0117446ea898ceb2a5e86bd61c0b758023bd0ab33e13c2d91c7c60cb9e5ea26a2d969257c6d26909dbb9da259
-
Filesize
123KB
MD5bfeab24969e80e4fd4362b05f5c54554
SHA1bc2365f8bc9163e0f327e11541e0462395a879ac
SHA256cc900fe27a79e792b7b2547191b65dbadb550b02b1b42d072c06d73096185206
SHA5124c658ed109aa774121820af99c16417c71a2adf0117446ea898ceb2a5e86bd61c0b758023bd0ab33e13c2d91c7c60cb9e5ea26a2d969257c6d26909dbb9da259
-
Filesize
123KB
MD5bfeab24969e80e4fd4362b05f5c54554
SHA1bc2365f8bc9163e0f327e11541e0462395a879ac
SHA256cc900fe27a79e792b7b2547191b65dbadb550b02b1b42d072c06d73096185206
SHA5124c658ed109aa774121820af99c16417c71a2adf0117446ea898ceb2a5e86bd61c0b758023bd0ab33e13c2d91c7c60cb9e5ea26a2d969257c6d26909dbb9da259
-
Filesize
123KB
MD5bfeab24969e80e4fd4362b05f5c54554
SHA1bc2365f8bc9163e0f327e11541e0462395a879ac
SHA256cc900fe27a79e792b7b2547191b65dbadb550b02b1b42d072c06d73096185206
SHA5124c658ed109aa774121820af99c16417c71a2adf0117446ea898ceb2a5e86bd61c0b758023bd0ab33e13c2d91c7c60cb9e5ea26a2d969257c6d26909dbb9da259
-
Filesize
123KB
MD5bfeab24969e80e4fd4362b05f5c54554
SHA1bc2365f8bc9163e0f327e11541e0462395a879ac
SHA256cc900fe27a79e792b7b2547191b65dbadb550b02b1b42d072c06d73096185206
SHA5124c658ed109aa774121820af99c16417c71a2adf0117446ea898ceb2a5e86bd61c0b758023bd0ab33e13c2d91c7c60cb9e5ea26a2d969257c6d26909dbb9da259