Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
123s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2022, 19:20
Static task
static1
Behavioral task
behavioral1
Sample
ae41a9adc878a15942f06880e84ce575f0d979ab61004d367c43d2cea5da57d7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ae41a9adc878a15942f06880e84ce575f0d979ab61004d367c43d2cea5da57d7.exe
Resource
win10v2004-20220812-en
General
-
Target
ae41a9adc878a15942f06880e84ce575f0d979ab61004d367c43d2cea5da57d7.exe
-
Size
346KB
-
MD5
388ae8001c7019b2e3f5401ce1e820f5
-
SHA1
2141fd73c2adfc36d438a943e4dbc3e13e453884
-
SHA256
ae41a9adc878a15942f06880e84ce575f0d979ab61004d367c43d2cea5da57d7
-
SHA512
18acf8027f07a73d4ae8557d1697dabb0d7b1a8982298b254c46a9fb0b7bedcb6b11a2f803732505eb942cb117fba3480e15e2b574fa4c461cfd92844221a564
-
SSDEEP
3072:GR2xn3k0CdM1vabyzJYWqO5z4EwevAHjmVep+23FlJ4+:GR2J0LS6VCz4ElAH5LRn
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 4592 ae41a9adc878a15942f06880e84ce575f0d979ab61004d367c43d2cea5da57d7mgr.exe 1336 WaterMark.exe 3696 WaterMarkmgr.exe 212 WaterMark.exe -
resource yara_rule behavioral2/memory/4996-141-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4592-143-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4592-145-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral2/memory/4996-146-0x0000000000400000-0x000000000047A000-memory.dmp upx behavioral2/memory/4592-147-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral2/memory/4996-148-0x0000000000400000-0x000000000047A000-memory.dmp upx behavioral2/memory/4592-149-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral2/memory/4996-150-0x0000000000400000-0x000000000047A000-memory.dmp upx behavioral2/memory/4996-174-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/1336-178-0x0000000000400000-0x000000000047A000-memory.dmp upx behavioral2/memory/4592-177-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/1336-179-0x0000000000400000-0x000000000047A000-memory.dmp upx behavioral2/memory/1336-180-0x0000000000400000-0x000000000047A000-memory.dmp upx behavioral2/memory/3696-175-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/1336-181-0x0000000000400000-0x000000000047A000-memory.dmp upx behavioral2/memory/212-182-0x0000000000400000-0x000000000047A000-memory.dmp upx behavioral2/memory/212-183-0x0000000000400000-0x000000000047A000-memory.dmp upx behavioral2/memory/212-184-0x0000000000400000-0x000000000047A000-memory.dmp upx behavioral2/memory/212-185-0x0000000000400000-0x000000000047A000-memory.dmp upx behavioral2/memory/1336-186-0x0000000000400000-0x000000000047A000-memory.dmp upx behavioral2/memory/1336-187-0x0000000000400000-0x000000000047A000-memory.dmp upx behavioral2/memory/1336-188-0x0000000000400000-0x000000000047A000-memory.dmp upx behavioral2/memory/212-189-0x0000000000400000-0x000000000047A000-memory.dmp upx behavioral2/memory/212-190-0x0000000000400000-0x000000000047A000-memory.dmp upx behavioral2/memory/212-191-0x0000000000400000-0x000000000047A000-memory.dmp upx behavioral2/memory/212-192-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Drops file in Program Files directory 9 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\px61B7.tmp ae41a9adc878a15942f06880e84ce575f0d979ab61004d367c43d2cea5da57d7mgr.exe File created C:\Program Files (x86)\Microsoft\WaterMark.exe ae41a9adc878a15942f06880e84ce575f0d979ab61004d367c43d2cea5da57d7.exe File opened for modification C:\Program Files (x86)\Microsoft\px64C5.tmp WaterMarkmgr.exe File created C:\Program Files (x86)\Microsoft\WaterMark.exe WaterMarkmgr.exe File opened for modification C:\Program Files (x86)\Microsoft\px61B8.tmp ae41a9adc878a15942f06880e84ce575f0d979ab61004d367c43d2cea5da57d7.exe File created C:\Program Files (x86)\Microsoft\WaterMark.exe ae41a9adc878a15942f06880e84ce575f0d979ab61004d367c43d2cea5da57d7mgr.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe ae41a9adc878a15942f06880e84ce575f0d979ab61004d367c43d2cea5da57d7.exe File created C:\Program Files (x86)\Microsoft\WaterMarkmgr.exe WaterMark.exe File created C:\Program Files (x86)\Microsoft\WaterMarkmgr.exe WaterMark.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4620 1392 WerFault.exe 84 4576 4488 WerFault.exe 85 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3751384898" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3948572555" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{0F52ED33-439B-11ED-AECB-7ED4F7B3352B} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{0F529F13-439B-11ED-AECB-7ED4F7B3352B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30988199" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3948572555" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30988199" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30988199" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3751697165" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30988199" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30988199" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30988199" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30988199" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30988199" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3751697165" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "371621863" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3751384898" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 1336 WaterMark.exe 1336 WaterMark.exe 212 WaterMark.exe 212 WaterMark.exe 1336 WaterMark.exe 212 WaterMark.exe 212 WaterMark.exe 1336 WaterMark.exe 212 WaterMark.exe 212 WaterMark.exe 212 WaterMark.exe 212 WaterMark.exe 212 WaterMark.exe 212 WaterMark.exe 212 WaterMark.exe 212 WaterMark.exe 212 WaterMark.exe 212 WaterMark.exe 212 WaterMark.exe 212 WaterMark.exe 1336 WaterMark.exe 1336 WaterMark.exe 1336 WaterMark.exe 1336 WaterMark.exe 1336 WaterMark.exe 1336 WaterMark.exe 1336 WaterMark.exe 1336 WaterMark.exe 1336 WaterMark.exe 1336 WaterMark.exe 1336 WaterMark.exe 1336 WaterMark.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1336 WaterMark.exe Token: SeDebugPrivilege 212 WaterMark.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2400 iexplore.exe 4424 iexplore.exe 4184 iexplore.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 4184 iexplore.exe 4184 iexplore.exe 4424 iexplore.exe 4424 iexplore.exe 2400 iexplore.exe 2400 iexplore.exe 3980 IEXPLORE.EXE 4792 IEXPLORE.EXE 4792 IEXPLORE.EXE 3980 IEXPLORE.EXE 4676 IEXPLORE.EXE 4676 IEXPLORE.EXE 4792 IEXPLORE.EXE 4792 IEXPLORE.EXE -
Suspicious use of UnmapMainImage 5 IoCs
pid Process 4592 ae41a9adc878a15942f06880e84ce575f0d979ab61004d367c43d2cea5da57d7mgr.exe 4996 ae41a9adc878a15942f06880e84ce575f0d979ab61004d367c43d2cea5da57d7.exe 1336 WaterMark.exe 3696 WaterMarkmgr.exe 212 WaterMark.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 4996 wrote to memory of 4592 4996 ae41a9adc878a15942f06880e84ce575f0d979ab61004d367c43d2cea5da57d7.exe 80 PID 4996 wrote to memory of 4592 4996 ae41a9adc878a15942f06880e84ce575f0d979ab61004d367c43d2cea5da57d7.exe 80 PID 4996 wrote to memory of 4592 4996 ae41a9adc878a15942f06880e84ce575f0d979ab61004d367c43d2cea5da57d7.exe 80 PID 4996 wrote to memory of 1336 4996 ae41a9adc878a15942f06880e84ce575f0d979ab61004d367c43d2cea5da57d7.exe 81 PID 4996 wrote to memory of 1336 4996 ae41a9adc878a15942f06880e84ce575f0d979ab61004d367c43d2cea5da57d7.exe 81 PID 4996 wrote to memory of 1336 4996 ae41a9adc878a15942f06880e84ce575f0d979ab61004d367c43d2cea5da57d7.exe 81 PID 1336 wrote to memory of 3696 1336 WaterMark.exe 82 PID 1336 wrote to memory of 3696 1336 WaterMark.exe 82 PID 1336 wrote to memory of 3696 1336 WaterMark.exe 82 PID 3696 wrote to memory of 212 3696 WaterMarkmgr.exe 83 PID 3696 wrote to memory of 212 3696 WaterMarkmgr.exe 83 PID 3696 wrote to memory of 212 3696 WaterMarkmgr.exe 83 PID 1336 wrote to memory of 4488 1336 WaterMark.exe 85 PID 1336 wrote to memory of 4488 1336 WaterMark.exe 85 PID 1336 wrote to memory of 4488 1336 WaterMark.exe 85 PID 212 wrote to memory of 1392 212 WaterMark.exe 84 PID 212 wrote to memory of 1392 212 WaterMark.exe 84 PID 212 wrote to memory of 1392 212 WaterMark.exe 84 PID 212 wrote to memory of 1392 212 WaterMark.exe 84 PID 212 wrote to memory of 1392 212 WaterMark.exe 84 PID 212 wrote to memory of 1392 212 WaterMark.exe 84 PID 212 wrote to memory of 1392 212 WaterMark.exe 84 PID 212 wrote to memory of 1392 212 WaterMark.exe 84 PID 212 wrote to memory of 1392 212 WaterMark.exe 84 PID 1336 wrote to memory of 4488 1336 WaterMark.exe 85 PID 1336 wrote to memory of 4488 1336 WaterMark.exe 85 PID 1336 wrote to memory of 4488 1336 WaterMark.exe 85 PID 1336 wrote to memory of 4488 1336 WaterMark.exe 85 PID 1336 wrote to memory of 4488 1336 WaterMark.exe 85 PID 1336 wrote to memory of 4488 1336 WaterMark.exe 85 PID 212 wrote to memory of 4424 212 WaterMark.exe 89 PID 212 wrote to memory of 4424 212 WaterMark.exe 89 PID 212 wrote to memory of 376 212 WaterMark.exe 91 PID 212 wrote to memory of 376 212 WaterMark.exe 91 PID 1336 wrote to memory of 4184 1336 WaterMark.exe 90 PID 1336 wrote to memory of 4184 1336 WaterMark.exe 90 PID 1336 wrote to memory of 2400 1336 WaterMark.exe 92 PID 1336 wrote to memory of 2400 1336 WaterMark.exe 92 PID 4184 wrote to memory of 3980 4184 iexplore.exe 99 PID 4184 wrote to memory of 3980 4184 iexplore.exe 99 PID 4184 wrote to memory of 3980 4184 iexplore.exe 99 PID 4424 wrote to memory of 4792 4424 iexplore.exe 98 PID 4424 wrote to memory of 4792 4424 iexplore.exe 98 PID 4424 wrote to memory of 4792 4424 iexplore.exe 98 PID 2400 wrote to memory of 4676 2400 iexplore.exe 97 PID 2400 wrote to memory of 4676 2400 iexplore.exe 97 PID 2400 wrote to memory of 4676 2400 iexplore.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae41a9adc878a15942f06880e84ce575f0d979ab61004d367c43d2cea5da57d7.exe"C:\Users\Admin\AppData\Local\Temp\ae41a9adc878a15942f06880e84ce575f0d979ab61004d367c43d2cea5da57d7.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Users\Admin\AppData\Local\Temp\ae41a9adc878a15942f06880e84ce575f0d979ab61004d367c43d2cea5da57d7mgr.exeC:\Users\Admin\AppData\Local\Temp\ae41a9adc878a15942f06880e84ce575f0d979ab61004d367c43d2cea5da57d7mgr.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:4592
-
-
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Program Files (x86)\Microsoft\WaterMarkmgr.exe"C:\Program Files (x86)\Microsoft\WaterMarkmgr.exe"3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe5⤵PID:1392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1392 -s 2086⤵
- Program crash
PID:4620
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4424 CREDAT:17410 /prefetch:26⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4792
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Modifies Internet Explorer settings
PID:376
-
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:4488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4488 -s 2044⤵
- Program crash
PID:4576
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4184 CREDAT:17410 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3980
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2400 CREDAT:17410 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4676
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4488 -ip 44881⤵PID:2200
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1392 -ip 13921⤵PID:4972
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
346KB
MD5388ae8001c7019b2e3f5401ce1e820f5
SHA12141fd73c2adfc36d438a943e4dbc3e13e453884
SHA256ae41a9adc878a15942f06880e84ce575f0d979ab61004d367c43d2cea5da57d7
SHA51218acf8027f07a73d4ae8557d1697dabb0d7b1a8982298b254c46a9fb0b7bedcb6b11a2f803732505eb942cb117fba3480e15e2b574fa4c461cfd92844221a564
-
Filesize
346KB
MD5388ae8001c7019b2e3f5401ce1e820f5
SHA12141fd73c2adfc36d438a943e4dbc3e13e453884
SHA256ae41a9adc878a15942f06880e84ce575f0d979ab61004d367c43d2cea5da57d7
SHA51218acf8027f07a73d4ae8557d1697dabb0d7b1a8982298b254c46a9fb0b7bedcb6b11a2f803732505eb942cb117fba3480e15e2b574fa4c461cfd92844221a564
-
Filesize
346KB
MD5388ae8001c7019b2e3f5401ce1e820f5
SHA12141fd73c2adfc36d438a943e4dbc3e13e453884
SHA256ae41a9adc878a15942f06880e84ce575f0d979ab61004d367c43d2cea5da57d7
SHA51218acf8027f07a73d4ae8557d1697dabb0d7b1a8982298b254c46a9fb0b7bedcb6b11a2f803732505eb942cb117fba3480e15e2b574fa4c461cfd92844221a564
-
Filesize
172KB
MD5f57abd3a76079ed9ba085bf71acf6cd3
SHA1018c940fdb62a466a5ada1338149bb7621ad8682
SHA25698c0c3c7b28a7eca1648bd25ae7927bae460de51a8a58c48b5c4fdc0a24963ba
SHA512cb77e53914ab4e3ed8804cea0c75f13630a756903a1db0e3f1e9b81cadae981a3fba32cf5ab2597c7b6104937fa1114a5588c0df78ae2d17f38c6e115120f001
-
Filesize
172KB
MD5f57abd3a76079ed9ba085bf71acf6cd3
SHA1018c940fdb62a466a5ada1338149bb7621ad8682
SHA25698c0c3c7b28a7eca1648bd25ae7927bae460de51a8a58c48b5c4fdc0a24963ba
SHA512cb77e53914ab4e3ed8804cea0c75f13630a756903a1db0e3f1e9b81cadae981a3fba32cf5ab2597c7b6104937fa1114a5588c0df78ae2d17f38c6e115120f001
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5046bedf3b97e782edc5343dc24a1c485
SHA1ebad04906d01fdb00719463e729f201a043433ae
SHA2564bb13178dccf62921053ef1b62f9bdb994dfd0520741873a60ac2c1484df78ca
SHA51218203014488892166d7c331f8239c1c030fd9831b8040d51b3fdf3d887f867380ff639ccac26e8751b7b13d1dc83e2931f96019783695e7a93c4348046c9fabf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5046bedf3b97e782edc5343dc24a1c485
SHA1ebad04906d01fdb00719463e729f201a043433ae
SHA2564bb13178dccf62921053ef1b62f9bdb994dfd0520741873a60ac2c1484df78ca
SHA51218203014488892166d7c331f8239c1c030fd9831b8040d51b3fdf3d887f867380ff639ccac26e8751b7b13d1dc83e2931f96019783695e7a93c4348046c9fabf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5046bedf3b97e782edc5343dc24a1c485
SHA1ebad04906d01fdb00719463e729f201a043433ae
SHA2564bb13178dccf62921053ef1b62f9bdb994dfd0520741873a60ac2c1484df78ca
SHA51218203014488892166d7c331f8239c1c030fd9831b8040d51b3fdf3d887f867380ff639ccac26e8751b7b13d1dc83e2931f96019783695e7a93c4348046c9fabf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD5566c37d8faf7e1a156d703d6cf5094b1
SHA1a483d13406588251a462b312ce5ee62014c37ad6
SHA256ce77187b2b83f73d727220a083d1c522228c60dc6f6b6d2eecea916904f718ed
SHA512a82572f460de3b0764e79bfddcb7de82b6dee07b743781ff28dd44cd6e9248eb53e5a2df70ce3a502c171aae5a1740d17ce0f89ed8eb2109aefa30a5d3973e49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD56d3fb0b64e0573470c0332abe612896d
SHA1b133d50622abfec2b12f4db02085afe516ba707f
SHA256f7da2f261e77e1bc774c794aa49483c1a58a3e967d02a5e1c5a18c7b47ffd55a
SHA512eda463d4b53e993a114b64fe1c2b7317e3537c266c26e32701757525659441acdc04ff01585356c2cd06b9d2999d28c41e6b18825304800fa5ec9031ffdbadaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD54d8e232adf3626942a487ef4ca3f272a
SHA1b511bc047c93c032f1119b26fbd514542a61f284
SHA25606ae14aee003c65261bf8552e14cf139230a55e7d06f91e2fa3ccd8e2d1e0fa2
SHA5124fc504c73500b8e6216b35df64a928a9c3d092b98f1e324db714bf7b59520ef3162daa6d9557b8cf8ee1223f04c9f96e1f5a3c842e4f22c69648337a8ca1cd74
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{0F529F13-439B-11ED-AECB-7ED4F7B3352B}.dat
Filesize3KB
MD55edb4adebff748405299dc7f2e7298f9
SHA10d1282f8103d9e2e30fdc5a90a50ed5a3c44c77b
SHA25619e012d48e1ca526273024fc0ce63fe73c17cb776803cab15402ca613b8bfcfa
SHA512faabf4b4dea0c0d4a0893e033dd1a8b3cde6a08c51fc8e4768ec12c0810055b9e1e4a5e75f4e8f7ac6613645512e131fe7b9e1e5b2a738cfe32f82d8f59382a2
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{0F529F13-439B-11ED-AECB-7ED4F7B3352B}.dat
Filesize5KB
MD50225aef715b3ce76659b1bed58fe0c01
SHA17f1811f8d35ec81e262816a6dbac7a2cdf4e62ae
SHA256ac246c6c3f0d3231ce6496646596103dda56254924bc403757b1f77aadc5bc47
SHA512ff45ed7293fa7f74eae4ee5091a9d202afef0ca7a1ebbc541af3b7034c3c9532ed1e2ec275a59c482c6eb9fd931ee4e29036f0fa81cb57b6ee2ac8d5d6071c99
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{0F52ED33-439B-11ED-AECB-7ED4F7B3352B}.dat
Filesize3KB
MD57b1cc3e8b4fc4545523a011087a02c11
SHA1756092ede8794f42d723342a393da608637b4771
SHA2563899cd259c64292182961d4c70f384de81bb9b519ad1f290f0c105257d7ec48a
SHA512fe612e9f2adec380e3bc542e436969be751f385e512e3b8bb4e22bb0a3e4db32698c750f229398b0e1081c3da325ed4c6798288076149310b94791c06761f642
-
C:\Users\Admin\AppData\Local\Temp\ae41a9adc878a15942f06880e84ce575f0d979ab61004d367c43d2cea5da57d7mgr.exe
Filesize172KB
MD5f57abd3a76079ed9ba085bf71acf6cd3
SHA1018c940fdb62a466a5ada1338149bb7621ad8682
SHA25698c0c3c7b28a7eca1648bd25ae7927bae460de51a8a58c48b5c4fdc0a24963ba
SHA512cb77e53914ab4e3ed8804cea0c75f13630a756903a1db0e3f1e9b81cadae981a3fba32cf5ab2597c7b6104937fa1114a5588c0df78ae2d17f38c6e115120f001
-
C:\Users\Admin\AppData\Local\Temp\ae41a9adc878a15942f06880e84ce575f0d979ab61004d367c43d2cea5da57d7mgr.exe
Filesize172KB
MD5f57abd3a76079ed9ba085bf71acf6cd3
SHA1018c940fdb62a466a5ada1338149bb7621ad8682
SHA25698c0c3c7b28a7eca1648bd25ae7927bae460de51a8a58c48b5c4fdc0a24963ba
SHA512cb77e53914ab4e3ed8804cea0c75f13630a756903a1db0e3f1e9b81cadae981a3fba32cf5ab2597c7b6104937fa1114a5588c0df78ae2d17f38c6e115120f001