Analysis
-
max time kernel
94s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2022, 05:14
Static task
static1
Behavioral task
behavioral1
Sample
db455a015a1dad6687854e9439dfd94c74ae7687682fdc97530ca04422929175.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
db455a015a1dad6687854e9439dfd94c74ae7687682fdc97530ca04422929175.dll
Resource
win10v2004-20220812-en
General
-
Target
db455a015a1dad6687854e9439dfd94c74ae7687682fdc97530ca04422929175.dll
-
Size
256KB
-
MD5
4892c63783a601b914c180b8e62a4a17
-
SHA1
7a665e9a7470431423918d16e4b31b2437d67753
-
SHA256
db455a015a1dad6687854e9439dfd94c74ae7687682fdc97530ca04422929175
-
SHA512
1e36a9a063f715466ddb5e3289e60c1aeb695d4f475ffbb1ce9cedc79a5e76182d1f2764042d5fbe088198110a58e80d85e823bcf6828d42320eae68ee61071f
-
SSDEEP
3072:j0NbrbkYHUyP9eECVWfpIhbWoVnW6IioARoKO7JurqeBTg4vRP86TvOB5n+902av:YrkYHjIWeWcd71bynuACvIH
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2344 rundll32mgr.exe 1780 WaterMark.exe -
resource yara_rule behavioral2/memory/2344-139-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/2344-140-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/2344-143-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/1780-151-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/1780-152-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/1780-153-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/1780-154-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/1780-156-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/1780-157-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/1780-158-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/1780-159-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral2/memory/1780-160-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\WaterMark.exe rundll32mgr.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe rundll32mgr.exe File opened for modification C:\Program Files (x86)\Microsoft\px1BB6.tmp rundll32mgr.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4428 3136 WerFault.exe 85 536 4924 WerFault.exe 80 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "371661957" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1168987155" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30988293" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30988293" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1094613406" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{6B5E9854-43F8-11ED-AECB-7ED4F7B3352B} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1094613406" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30988293" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 1780 WaterMark.exe 1780 WaterMark.exe 1780 WaterMark.exe 1780 WaterMark.exe 1780 WaterMark.exe 1780 WaterMark.exe 1780 WaterMark.exe 1780 WaterMark.exe 1780 WaterMark.exe 1780 WaterMark.exe 1780 WaterMark.exe 1780 WaterMark.exe 1780 WaterMark.exe 1780 WaterMark.exe 1780 WaterMark.exe 1780 WaterMark.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1780 WaterMark.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4036 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4036 iexplore.exe 4036 iexplore.exe 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2344 rundll32mgr.exe 1780 WaterMark.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 4980 wrote to memory of 4924 4980 rundll32.exe 80 PID 4980 wrote to memory of 4924 4980 rundll32.exe 80 PID 4980 wrote to memory of 4924 4980 rundll32.exe 80 PID 4924 wrote to memory of 2344 4924 rundll32.exe 81 PID 4924 wrote to memory of 2344 4924 rundll32.exe 81 PID 4924 wrote to memory of 2344 4924 rundll32.exe 81 PID 2344 wrote to memory of 1780 2344 rundll32mgr.exe 84 PID 2344 wrote to memory of 1780 2344 rundll32mgr.exe 84 PID 2344 wrote to memory of 1780 2344 rundll32mgr.exe 84 PID 1780 wrote to memory of 3136 1780 WaterMark.exe 85 PID 1780 wrote to memory of 3136 1780 WaterMark.exe 85 PID 1780 wrote to memory of 3136 1780 WaterMark.exe 85 PID 1780 wrote to memory of 3136 1780 WaterMark.exe 85 PID 1780 wrote to memory of 3136 1780 WaterMark.exe 85 PID 1780 wrote to memory of 3136 1780 WaterMark.exe 85 PID 1780 wrote to memory of 3136 1780 WaterMark.exe 85 PID 1780 wrote to memory of 3136 1780 WaterMark.exe 85 PID 1780 wrote to memory of 3136 1780 WaterMark.exe 85 PID 1780 wrote to memory of 4368 1780 WaterMark.exe 89 PID 1780 wrote to memory of 4368 1780 WaterMark.exe 89 PID 1780 wrote to memory of 4036 1780 WaterMark.exe 90 PID 1780 wrote to memory of 4036 1780 WaterMark.exe 90 PID 4036 wrote to memory of 2192 4036 iexplore.exe 91 PID 4036 wrote to memory of 2192 4036 iexplore.exe 91 PID 4036 wrote to memory of 2192 4036 iexplore.exe 91
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\db455a015a1dad6687854e9439dfd94c74ae7687682fdc97530ca04422929175.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\db455a015a1dad6687854e9439dfd94c74ae7687682fdc97530ca04422929175.dll,#12⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe5⤵PID:3136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3136 -s 2046⤵
- Program crash
PID:4428
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Modifies Internet Explorer settings
PID:4368
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4036 CREDAT:17410 /prefetch:26⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2192
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 6083⤵
- Program crash
PID:536
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4924 -ip 49241⤵PID:1812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3136 -ip 31361⤵PID:1920
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD509c3d4561f7568136eba3497a70097e4
SHA1ea5663c35fd4c4bc6abd708e3389d0a6e500e6fb
SHA256b5d9a59d44b1f9178a9655a29bbed0e614ecbb64f9950dfb0f964046c225bd53
SHA5123b1aee08f81495470471ed20cb00139fda41c94547c5077cd21384ad21c7b3c8a58849e813d4cfc6019171afb3dfeb2ddc270bf7de1d9c9a4242ae4b3b09288b
-
Filesize
89KB
MD509c3d4561f7568136eba3497a70097e4
SHA1ea5663c35fd4c4bc6abd708e3389d0a6e500e6fb
SHA256b5d9a59d44b1f9178a9655a29bbed0e614ecbb64f9950dfb0f964046c225bd53
SHA5123b1aee08f81495470471ed20cb00139fda41c94547c5077cd21384ad21c7b3c8a58849e813d4cfc6019171afb3dfeb2ddc270bf7de1d9c9a4242ae4b3b09288b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5afc3e2584b32e1e7c23c33e9534089a5
SHA1ea4e2266d010c300621d2287ea60fe3e9a9ee753
SHA25661597f5f937da250a5ed7b4b82867bebc546a5a35c0029982a003b1e9cbd2e7e
SHA512f0e0d20b15bc390292baf0d93d982315afc466ccd2d4e48152ed65af97aed573d5b9e65b2b50925cbcd2e736955dfec4f63de5739cdb1499eb2db5dfc3cc4fe6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD5e869c9c82e2ccfabdec4d4a47995e582
SHA1f2d6159ef0025b66e0e76aaa35c4f47aa90616f9
SHA25624ada17f03263e2fe4d5bfdb4631b2f70a1fc9b58e701d0ca7c01fb23bf21f6f
SHA5123dc464a24475561b7f7f0570033aa4618329e07ac01da3c1e56d2e631677b739925f96ddacfce146fc783137a9a0376c12a16fd2f3d6e659b525140a06d1ebdc
-
Filesize
89KB
MD509c3d4561f7568136eba3497a70097e4
SHA1ea5663c35fd4c4bc6abd708e3389d0a6e500e6fb
SHA256b5d9a59d44b1f9178a9655a29bbed0e614ecbb64f9950dfb0f964046c225bd53
SHA5123b1aee08f81495470471ed20cb00139fda41c94547c5077cd21384ad21c7b3c8a58849e813d4cfc6019171afb3dfeb2ddc270bf7de1d9c9a4242ae4b3b09288b
-
Filesize
89KB
MD509c3d4561f7568136eba3497a70097e4
SHA1ea5663c35fd4c4bc6abd708e3389d0a6e500e6fb
SHA256b5d9a59d44b1f9178a9655a29bbed0e614ecbb64f9950dfb0f964046c225bd53
SHA5123b1aee08f81495470471ed20cb00139fda41c94547c5077cd21384ad21c7b3c8a58849e813d4cfc6019171afb3dfeb2ddc270bf7de1d9c9a4242ae4b3b09288b