Analysis
-
max time kernel
154s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/10/2022, 19:20
Static task
static1
Behavioral task
behavioral1
Sample
ae41a9adc878a15942f06880e84ce575f0d979ab61004d367c43d2cea5da57d7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ae41a9adc878a15942f06880e84ce575f0d979ab61004d367c43d2cea5da57d7.exe
Resource
win10v2004-20220812-en
General
-
Target
ae41a9adc878a15942f06880e84ce575f0d979ab61004d367c43d2cea5da57d7.exe
-
Size
346KB
-
MD5
388ae8001c7019b2e3f5401ce1e820f5
-
SHA1
2141fd73c2adfc36d438a943e4dbc3e13e453884
-
SHA256
ae41a9adc878a15942f06880e84ce575f0d979ab61004d367c43d2cea5da57d7
-
SHA512
18acf8027f07a73d4ae8557d1697dabb0d7b1a8982298b254c46a9fb0b7bedcb6b11a2f803732505eb942cb117fba3480e15e2b574fa4c461cfd92844221a564
-
SSDEEP
3072:GR2xn3k0CdM1vabyzJYWqO5z4EwevAHjmVep+23FlJ4+:GR2J0LS6VCz4ElAH5LRn
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,c:\\program files (x86)\\microsoft\\watermark.exe" svchost.exe -
Executes dropped EXE 3 IoCs
pid Process 1968 ae41a9adc878a15942f06880e84ce575f0d979ab61004d367c43d2cea5da57d7mgr.exe 616 WaterMark.exe 1560 WaterMark.exe -
resource yara_rule behavioral1/memory/1076-64-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1076-67-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1968-72-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/1076-73-0x0000000000400000-0x000000000047A000-memory.dmp upx behavioral1/memory/1076-82-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1968-81-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/616-99-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/1560-100-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/1560-101-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral1/memory/1560-172-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/616-702-0x0000000000400000-0x000000000044E000-memory.dmp upx -
Loads dropped DLL 6 IoCs
pid Process 1076 ae41a9adc878a15942f06880e84ce575f0d979ab61004d367c43d2cea5da57d7.exe 1076 ae41a9adc878a15942f06880e84ce575f0d979ab61004d367c43d2cea5da57d7.exe 1076 ae41a9adc878a15942f06880e84ce575f0d979ab61004d367c43d2cea5da57d7.exe 1968 ae41a9adc878a15942f06880e84ce575f0d979ab61004d367c43d2cea5da57d7mgr.exe 1968 ae41a9adc878a15942f06880e84ce575f0d979ab61004d367c43d2cea5da57d7mgr.exe 1076 ae41a9adc878a15942f06880e84ce575f0d979ab61004d367c43d2cea5da57d7.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\dmlconf.dat svchost.exe File created C:\Windows\SysWOW64\dmlconf.dat svchost.exe -
Drops file in Program Files directory 6 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\px6807.tmp ae41a9adc878a15942f06880e84ce575f0d979ab61004d367c43d2cea5da57d7mgr.exe File opened for modification C:\Program Files (x86)\Microsoft\px6808.tmp ae41a9adc878a15942f06880e84ce575f0d979ab61004d367c43d2cea5da57d7.exe File created C:\Program Files (x86)\Microsoft\WaterMark.exe ae41a9adc878a15942f06880e84ce575f0d979ab61004d367c43d2cea5da57d7mgr.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe ae41a9adc878a15942f06880e84ce575f0d979ab61004d367c43d2cea5da57d7mgr.exe File created C:\Program Files (x86)\Microsoft\WaterMark.exe ae41a9adc878a15942f06880e84ce575f0d979ab61004d367c43d2cea5da57d7.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 1560 WaterMark.exe 1560 WaterMark.exe 1560 WaterMark.exe 1560 WaterMark.exe 1560 WaterMark.exe 1560 WaterMark.exe 1560 WaterMark.exe 1560 WaterMark.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe 1292 svchost.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1560 WaterMark.exe Token: SeDebugPrivilege 1292 svchost.exe Token: SeDebugPrivilege 616 WaterMark.exe Token: SeDebugPrivilege 1560 WaterMark.exe -
Suspicious use of UnmapMainImage 4 IoCs
pid Process 1076 ae41a9adc878a15942f06880e84ce575f0d979ab61004d367c43d2cea5da57d7.exe 1968 ae41a9adc878a15942f06880e84ce575f0d979ab61004d367c43d2cea5da57d7mgr.exe 616 WaterMark.exe 1560 WaterMark.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1076 wrote to memory of 1968 1076 ae41a9adc878a15942f06880e84ce575f0d979ab61004d367c43d2cea5da57d7.exe 26 PID 1076 wrote to memory of 1968 1076 ae41a9adc878a15942f06880e84ce575f0d979ab61004d367c43d2cea5da57d7.exe 26 PID 1076 wrote to memory of 1968 1076 ae41a9adc878a15942f06880e84ce575f0d979ab61004d367c43d2cea5da57d7.exe 26 PID 1076 wrote to memory of 1968 1076 ae41a9adc878a15942f06880e84ce575f0d979ab61004d367c43d2cea5da57d7.exe 26 PID 1968 wrote to memory of 1560 1968 ae41a9adc878a15942f06880e84ce575f0d979ab61004d367c43d2cea5da57d7mgr.exe 27 PID 1968 wrote to memory of 1560 1968 ae41a9adc878a15942f06880e84ce575f0d979ab61004d367c43d2cea5da57d7mgr.exe 27 PID 1968 wrote to memory of 1560 1968 ae41a9adc878a15942f06880e84ce575f0d979ab61004d367c43d2cea5da57d7mgr.exe 27 PID 1968 wrote to memory of 1560 1968 ae41a9adc878a15942f06880e84ce575f0d979ab61004d367c43d2cea5da57d7mgr.exe 27 PID 1076 wrote to memory of 616 1076 ae41a9adc878a15942f06880e84ce575f0d979ab61004d367c43d2cea5da57d7.exe 28 PID 1076 wrote to memory of 616 1076 ae41a9adc878a15942f06880e84ce575f0d979ab61004d367c43d2cea5da57d7.exe 28 PID 1076 wrote to memory of 616 1076 ae41a9adc878a15942f06880e84ce575f0d979ab61004d367c43d2cea5da57d7.exe 28 PID 1076 wrote to memory of 616 1076 ae41a9adc878a15942f06880e84ce575f0d979ab61004d367c43d2cea5da57d7.exe 28 PID 1560 wrote to memory of 572 1560 WaterMark.exe 29 PID 1560 wrote to memory of 572 1560 WaterMark.exe 29 PID 1560 wrote to memory of 572 1560 WaterMark.exe 29 PID 1560 wrote to memory of 572 1560 WaterMark.exe 29 PID 1560 wrote to memory of 572 1560 WaterMark.exe 29 PID 1560 wrote to memory of 572 1560 WaterMark.exe 29 PID 1560 wrote to memory of 572 1560 WaterMark.exe 29 PID 1560 wrote to memory of 572 1560 WaterMark.exe 29 PID 1560 wrote to memory of 572 1560 WaterMark.exe 29 PID 1560 wrote to memory of 572 1560 WaterMark.exe 29 PID 1560 wrote to memory of 1292 1560 WaterMark.exe 30 PID 1560 wrote to memory of 1292 1560 WaterMark.exe 30 PID 1560 wrote to memory of 1292 1560 WaterMark.exe 30 PID 1560 wrote to memory of 1292 1560 WaterMark.exe 30 PID 1560 wrote to memory of 1292 1560 WaterMark.exe 30 PID 1560 wrote to memory of 1292 1560 WaterMark.exe 30 PID 1560 wrote to memory of 1292 1560 WaterMark.exe 30 PID 1560 wrote to memory of 1292 1560 WaterMark.exe 30 PID 1560 wrote to memory of 1292 1560 WaterMark.exe 30 PID 1560 wrote to memory of 1292 1560 WaterMark.exe 30 PID 1292 wrote to memory of 260 1292 svchost.exe 7 PID 1292 wrote to memory of 260 1292 svchost.exe 7 PID 1292 wrote to memory of 260 1292 svchost.exe 7 PID 1292 wrote to memory of 260 1292 svchost.exe 7 PID 1292 wrote to memory of 260 1292 svchost.exe 7 PID 1292 wrote to memory of 332 1292 svchost.exe 6 PID 1292 wrote to memory of 332 1292 svchost.exe 6 PID 1292 wrote to memory of 332 1292 svchost.exe 6 PID 1292 wrote to memory of 332 1292 svchost.exe 6 PID 1292 wrote to memory of 332 1292 svchost.exe 6 PID 1292 wrote to memory of 368 1292 svchost.exe 5 PID 1292 wrote to memory of 368 1292 svchost.exe 5 PID 1292 wrote to memory of 368 1292 svchost.exe 5 PID 1292 wrote to memory of 368 1292 svchost.exe 5 PID 1292 wrote to memory of 368 1292 svchost.exe 5 PID 1292 wrote to memory of 376 1292 svchost.exe 4 PID 1292 wrote to memory of 376 1292 svchost.exe 4 PID 1292 wrote to memory of 376 1292 svchost.exe 4 PID 1292 wrote to memory of 376 1292 svchost.exe 4 PID 1292 wrote to memory of 376 1292 svchost.exe 4 PID 1292 wrote to memory of 416 1292 svchost.exe 3 PID 1292 wrote to memory of 416 1292 svchost.exe 3 PID 1292 wrote to memory of 416 1292 svchost.exe 3 PID 1292 wrote to memory of 416 1292 svchost.exe 3 PID 1292 wrote to memory of 416 1292 svchost.exe 3 PID 1292 wrote to memory of 464 1292 svchost.exe 2 PID 1292 wrote to memory of 464 1292 svchost.exe 2 PID 1292 wrote to memory of 464 1292 svchost.exe 2 PID 1292 wrote to memory of 464 1292 svchost.exe 2 PID 1292 wrote to memory of 464 1292 svchost.exe 2 PID 1292 wrote to memory of 472 1292 svchost.exe 1 PID 1292 wrote to memory of 472 1292 svchost.exe 1
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:472
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵PID:464
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵PID:836
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵PID:340
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵PID:1264
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵PID:1028
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵PID:284
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵PID:880
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵PID:1848
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵PID:1660
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵PID:804
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:744
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵PID:668
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵PID:588
-
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:416
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:376
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:368
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:480
-
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:332
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe1⤵PID:260
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1348
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1416
-
C:\Users\Admin\AppData\Local\Temp\ae41a9adc878a15942f06880e84ce575f0d979ab61004d367c43d2cea5da57d7.exe"C:\Users\Admin\AppData\Local\Temp\ae41a9adc878a15942f06880e84ce575f0d979ab61004d367c43d2cea5da57d7.exe"2⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Users\Admin\AppData\Local\Temp\ae41a9adc878a15942f06880e84ce575f0d979ab61004d367c43d2cea5da57d7mgr.exeC:\Users\Admin\AppData\Local\Temp\ae41a9adc878a15942f06880e84ce575f0d979ab61004d367c43d2cea5da57d7mgr.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe5⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Drops file in Program Files directory
PID:572
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1292
-
-
-
-
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
PID:616
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172KB
MD5f57abd3a76079ed9ba085bf71acf6cd3
SHA1018c940fdb62a466a5ada1338149bb7621ad8682
SHA25698c0c3c7b28a7eca1648bd25ae7927bae460de51a8a58c48b5c4fdc0a24963ba
SHA512cb77e53914ab4e3ed8804cea0c75f13630a756903a1db0e3f1e9b81cadae981a3fba32cf5ab2597c7b6104937fa1114a5588c0df78ae2d17f38c6e115120f001
-
Filesize
172KB
MD5f57abd3a76079ed9ba085bf71acf6cd3
SHA1018c940fdb62a466a5ada1338149bb7621ad8682
SHA25698c0c3c7b28a7eca1648bd25ae7927bae460de51a8a58c48b5c4fdc0a24963ba
SHA512cb77e53914ab4e3ed8804cea0c75f13630a756903a1db0e3f1e9b81cadae981a3fba32cf5ab2597c7b6104937fa1114a5588c0df78ae2d17f38c6e115120f001
-
Filesize
172KB
MD5f57abd3a76079ed9ba085bf71acf6cd3
SHA1018c940fdb62a466a5ada1338149bb7621ad8682
SHA25698c0c3c7b28a7eca1648bd25ae7927bae460de51a8a58c48b5c4fdc0a24963ba
SHA512cb77e53914ab4e3ed8804cea0c75f13630a756903a1db0e3f1e9b81cadae981a3fba32cf5ab2597c7b6104937fa1114a5588c0df78ae2d17f38c6e115120f001
-
C:\Users\Admin\AppData\Local\Temp\ae41a9adc878a15942f06880e84ce575f0d979ab61004d367c43d2cea5da57d7mgr.exe
Filesize172KB
MD5f57abd3a76079ed9ba085bf71acf6cd3
SHA1018c940fdb62a466a5ada1338149bb7621ad8682
SHA25698c0c3c7b28a7eca1648bd25ae7927bae460de51a8a58c48b5c4fdc0a24963ba
SHA512cb77e53914ab4e3ed8804cea0c75f13630a756903a1db0e3f1e9b81cadae981a3fba32cf5ab2597c7b6104937fa1114a5588c0df78ae2d17f38c6e115120f001
-
C:\Users\Admin\AppData\Local\Temp\ae41a9adc878a15942f06880e84ce575f0d979ab61004d367c43d2cea5da57d7mgr.exe
Filesize172KB
MD5f57abd3a76079ed9ba085bf71acf6cd3
SHA1018c940fdb62a466a5ada1338149bb7621ad8682
SHA25698c0c3c7b28a7eca1648bd25ae7927bae460de51a8a58c48b5c4fdc0a24963ba
SHA512cb77e53914ab4e3ed8804cea0c75f13630a756903a1db0e3f1e9b81cadae981a3fba32cf5ab2597c7b6104937fa1114a5588c0df78ae2d17f38c6e115120f001
-
Filesize
172KB
MD5f57abd3a76079ed9ba085bf71acf6cd3
SHA1018c940fdb62a466a5ada1338149bb7621ad8682
SHA25698c0c3c7b28a7eca1648bd25ae7927bae460de51a8a58c48b5c4fdc0a24963ba
SHA512cb77e53914ab4e3ed8804cea0c75f13630a756903a1db0e3f1e9b81cadae981a3fba32cf5ab2597c7b6104937fa1114a5588c0df78ae2d17f38c6e115120f001
-
Filesize
172KB
MD5f57abd3a76079ed9ba085bf71acf6cd3
SHA1018c940fdb62a466a5ada1338149bb7621ad8682
SHA25698c0c3c7b28a7eca1648bd25ae7927bae460de51a8a58c48b5c4fdc0a24963ba
SHA512cb77e53914ab4e3ed8804cea0c75f13630a756903a1db0e3f1e9b81cadae981a3fba32cf5ab2597c7b6104937fa1114a5588c0df78ae2d17f38c6e115120f001
-
Filesize
172KB
MD5f57abd3a76079ed9ba085bf71acf6cd3
SHA1018c940fdb62a466a5ada1338149bb7621ad8682
SHA25698c0c3c7b28a7eca1648bd25ae7927bae460de51a8a58c48b5c4fdc0a24963ba
SHA512cb77e53914ab4e3ed8804cea0c75f13630a756903a1db0e3f1e9b81cadae981a3fba32cf5ab2597c7b6104937fa1114a5588c0df78ae2d17f38c6e115120f001
-
Filesize
172KB
MD5f57abd3a76079ed9ba085bf71acf6cd3
SHA1018c940fdb62a466a5ada1338149bb7621ad8682
SHA25698c0c3c7b28a7eca1648bd25ae7927bae460de51a8a58c48b5c4fdc0a24963ba
SHA512cb77e53914ab4e3ed8804cea0c75f13630a756903a1db0e3f1e9b81cadae981a3fba32cf5ab2597c7b6104937fa1114a5588c0df78ae2d17f38c6e115120f001
-
\Users\Admin\AppData\Local\Temp\ae41a9adc878a15942f06880e84ce575f0d979ab61004d367c43d2cea5da57d7mgr.exe
Filesize172KB
MD5f57abd3a76079ed9ba085bf71acf6cd3
SHA1018c940fdb62a466a5ada1338149bb7621ad8682
SHA25698c0c3c7b28a7eca1648bd25ae7927bae460de51a8a58c48b5c4fdc0a24963ba
SHA512cb77e53914ab4e3ed8804cea0c75f13630a756903a1db0e3f1e9b81cadae981a3fba32cf5ab2597c7b6104937fa1114a5588c0df78ae2d17f38c6e115120f001
-
\Users\Admin\AppData\Local\Temp\ae41a9adc878a15942f06880e84ce575f0d979ab61004d367c43d2cea5da57d7mgr.exe
Filesize172KB
MD5f57abd3a76079ed9ba085bf71acf6cd3
SHA1018c940fdb62a466a5ada1338149bb7621ad8682
SHA25698c0c3c7b28a7eca1648bd25ae7927bae460de51a8a58c48b5c4fdc0a24963ba
SHA512cb77e53914ab4e3ed8804cea0c75f13630a756903a1db0e3f1e9b81cadae981a3fba32cf5ab2597c7b6104937fa1114a5588c0df78ae2d17f38c6e115120f001