Analysis
-
max time kernel
151s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 22:34
Static task
static1
Behavioral task
behavioral1
Sample
f7102b3dbb3fb16d64276e9a683b0706e2f99bd73a0fb4425f26e239fa356882.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f7102b3dbb3fb16d64276e9a683b0706e2f99bd73a0fb4425f26e239fa356882.dll
Resource
win10v2004-20220812-en
General
-
Target
f7102b3dbb3fb16d64276e9a683b0706e2f99bd73a0fb4425f26e239fa356882.dll
-
Size
140KB
-
MD5
77100d20e1f863b2e51be49fc54ac82c
-
SHA1
6b408efb7f144e9bb291441bab764c748de49af7
-
SHA256
f7102b3dbb3fb16d64276e9a683b0706e2f99bd73a0fb4425f26e239fa356882
-
SHA512
16abd9b490ff97068ea3934e705fccbafad13c8d747913ea364ad348196da3a243fbc158f2397abf1b32682432c7ef202365866e1c7ac8861d95dba2d9c2d002
-
SSDEEP
3072:nD09MaWLOdfPQdYeW2Nh/7HFgbIleiuYod:RaqOdHQ5PtlHun
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,c:\\program files (x86)\\microsoft\\watermark.exe" svchost.exe -
Executes dropped EXE 2 IoCs
pid Process 1968 rundll32Srv.exe 1596 WaterMark.exe -
resource yara_rule behavioral1/files/0x0007000000005c50-56.dat upx behavioral1/memory/1056-58-0x00000000001F0000-0x000000000023F000-memory.dmp upx behavioral1/files/0x0007000000005c50-59.dat upx behavioral1/files/0x0007000000005c50-61.dat upx behavioral1/files/0x0007000000005c50-63.dat upx behavioral1/files/0x000b0000000122c4-64.dat upx behavioral1/files/0x000b0000000122c4-65.dat upx behavioral1/files/0x000b0000000122c4-67.dat upx behavioral1/memory/1968-68-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/1596-70-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/files/0x000b0000000122c4-71.dat upx behavioral1/memory/1596-81-0x0000000000400000-0x000000000044F000-memory.dmp upx behavioral1/memory/1596-207-0x0000000000400000-0x000000000044F000-memory.dmp upx -
Loads dropped DLL 4 IoCs
pid Process 1056 rundll32.exe 1056 rundll32.exe 1968 rundll32Srv.exe 1968 rundll32Srv.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32Srv.exe rundll32.exe File created C:\Windows\SysWOW64\dmlconf.dat svchost.exe File opened for modification C:\Windows\SysWOW64\dmlconf.dat svchost.exe -
Drops file in Program Files directory 10 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\px4CE9.tmp rundll32Srv.exe File created C:\Program Files (x86)\Microsoft\WaterMark.exe rundll32Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe rundll32Srv.exe File opened for modification C:\Program Files\7-Zip\7-zip.dll svchost.exe File opened for modification C:\Program Files\7-Zip\7z.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7-zip32.dll svchost.exe File opened for modification C:\Program Files\7-Zip\7z.dll svchost.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7zG.exe svchost.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2024 1056 WerFault.exe 26 -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 1596 WaterMark.exe 1596 WaterMark.exe 1596 WaterMark.exe 1596 WaterMark.exe 1596 WaterMark.exe 1596 WaterMark.exe 1596 WaterMark.exe 1596 WaterMark.exe 824 svchost.exe 824 svchost.exe 824 svchost.exe 824 svchost.exe 824 svchost.exe 824 svchost.exe 824 svchost.exe 824 svchost.exe 824 svchost.exe 824 svchost.exe 824 svchost.exe 824 svchost.exe 824 svchost.exe 824 svchost.exe 824 svchost.exe 824 svchost.exe 824 svchost.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1596 WaterMark.exe Token: SeDebugPrivilege 824 svchost.exe Token: SeDebugPrivilege 1056 rundll32.exe Token: SeDebugPrivilege 2024 WerFault.exe Token: SeDebugPrivilege 1596 WaterMark.exe Token: SeDebugPrivilege 996 svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1088 wrote to memory of 1056 1088 rundll32.exe 26 PID 1088 wrote to memory of 1056 1088 rundll32.exe 26 PID 1088 wrote to memory of 1056 1088 rundll32.exe 26 PID 1088 wrote to memory of 1056 1088 rundll32.exe 26 PID 1088 wrote to memory of 1056 1088 rundll32.exe 26 PID 1088 wrote to memory of 1056 1088 rundll32.exe 26 PID 1088 wrote to memory of 1056 1088 rundll32.exe 26 PID 1056 wrote to memory of 1968 1056 rundll32.exe 27 PID 1056 wrote to memory of 1968 1056 rundll32.exe 27 PID 1056 wrote to memory of 1968 1056 rundll32.exe 27 PID 1056 wrote to memory of 1968 1056 rundll32.exe 27 PID 1056 wrote to memory of 2024 1056 rundll32.exe 28 PID 1056 wrote to memory of 2024 1056 rundll32.exe 28 PID 1056 wrote to memory of 2024 1056 rundll32.exe 28 PID 1056 wrote to memory of 2024 1056 rundll32.exe 28 PID 1968 wrote to memory of 1596 1968 rundll32Srv.exe 29 PID 1968 wrote to memory of 1596 1968 rundll32Srv.exe 29 PID 1968 wrote to memory of 1596 1968 rundll32Srv.exe 29 PID 1968 wrote to memory of 1596 1968 rundll32Srv.exe 29 PID 1596 wrote to memory of 996 1596 WaterMark.exe 30 PID 1596 wrote to memory of 996 1596 WaterMark.exe 30 PID 1596 wrote to memory of 996 1596 WaterMark.exe 30 PID 1596 wrote to memory of 996 1596 WaterMark.exe 30 PID 1596 wrote to memory of 996 1596 WaterMark.exe 30 PID 1596 wrote to memory of 996 1596 WaterMark.exe 30 PID 1596 wrote to memory of 996 1596 WaterMark.exe 30 PID 1596 wrote to memory of 996 1596 WaterMark.exe 30 PID 1596 wrote to memory of 996 1596 WaterMark.exe 30 PID 1596 wrote to memory of 996 1596 WaterMark.exe 30 PID 1596 wrote to memory of 824 1596 WaterMark.exe 31 PID 1596 wrote to memory of 824 1596 WaterMark.exe 31 PID 1596 wrote to memory of 824 1596 WaterMark.exe 31 PID 1596 wrote to memory of 824 1596 WaterMark.exe 31 PID 1596 wrote to memory of 824 1596 WaterMark.exe 31 PID 1596 wrote to memory of 824 1596 WaterMark.exe 31 PID 1596 wrote to memory of 824 1596 WaterMark.exe 31 PID 1596 wrote to memory of 824 1596 WaterMark.exe 31 PID 1596 wrote to memory of 824 1596 WaterMark.exe 31 PID 1596 wrote to memory of 824 1596 WaterMark.exe 31 PID 824 wrote to memory of 260 824 svchost.exe 7 PID 824 wrote to memory of 260 824 svchost.exe 7 PID 824 wrote to memory of 260 824 svchost.exe 7 PID 824 wrote to memory of 260 824 svchost.exe 7 PID 824 wrote to memory of 260 824 svchost.exe 7 PID 824 wrote to memory of 332 824 svchost.exe 6 PID 824 wrote to memory of 332 824 svchost.exe 6 PID 824 wrote to memory of 332 824 svchost.exe 6 PID 824 wrote to memory of 332 824 svchost.exe 6 PID 824 wrote to memory of 332 824 svchost.exe 6 PID 824 wrote to memory of 368 824 svchost.exe 5 PID 824 wrote to memory of 368 824 svchost.exe 5 PID 824 wrote to memory of 368 824 svchost.exe 5 PID 824 wrote to memory of 368 824 svchost.exe 5 PID 824 wrote to memory of 368 824 svchost.exe 5 PID 824 wrote to memory of 376 824 svchost.exe 4 PID 824 wrote to memory of 376 824 svchost.exe 4 PID 824 wrote to memory of 376 824 svchost.exe 4 PID 824 wrote to memory of 376 824 svchost.exe 4 PID 824 wrote to memory of 376 824 svchost.exe 4 PID 824 wrote to memory of 416 824 svchost.exe 3 PID 824 wrote to memory of 416 824 svchost.exe 3 PID 824 wrote to memory of 416 824 svchost.exe 3 PID 824 wrote to memory of 416 824 svchost.exe 3 PID 824 wrote to memory of 416 824 svchost.exe 3
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:472
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵PID:464
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵PID:588
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵PID:340
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵PID:1028
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵PID:1848
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵PID:1660
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵PID:1264
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵PID:284
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵PID:880
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵PID:836
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵PID:804
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:744
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵PID:668
-
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:416
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:376
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:368
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:480
-
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:332
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe1⤵PID:260
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1348
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1416
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f7102b3dbb3fb16d64276e9a683b0706e2f99bd73a0fb4425f26e239fa356882.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f7102b3dbb3fb16d64276e9a683b0706e2f99bd73a0fb4425f26e239fa356882.dll,#13⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\SysWOW64\rundll32Srv.exeC:\Windows\SysWOW64\rundll32Srv.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe6⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:996
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:824
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1056 -s 2284⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2024
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
94KB
MD50ade8b6133b3132e08e58d7685978d50
SHA1858a4d2941ce5a0316ae820203508674e70f7c00
SHA256c0db177e44639c948f1547b437df118762747c4604e7c95c44717fa827ea3049
SHA51299cb2252f1e7a905be9642d4a0c6da8d271b063fe2724ca636d2a8399fb779a554871362b7f34d396d3b5b909433ad6f34fe1ffaa54c31fc22c230788c7d2f4e
-
Filesize
94KB
MD50ade8b6133b3132e08e58d7685978d50
SHA1858a4d2941ce5a0316ae820203508674e70f7c00
SHA256c0db177e44639c948f1547b437df118762747c4604e7c95c44717fa827ea3049
SHA51299cb2252f1e7a905be9642d4a0c6da8d271b063fe2724ca636d2a8399fb779a554871362b7f34d396d3b5b909433ad6f34fe1ffaa54c31fc22c230788c7d2f4e
-
Filesize
94KB
MD50ade8b6133b3132e08e58d7685978d50
SHA1858a4d2941ce5a0316ae820203508674e70f7c00
SHA256c0db177e44639c948f1547b437df118762747c4604e7c95c44717fa827ea3049
SHA51299cb2252f1e7a905be9642d4a0c6da8d271b063fe2724ca636d2a8399fb779a554871362b7f34d396d3b5b909433ad6f34fe1ffaa54c31fc22c230788c7d2f4e
-
Filesize
94KB
MD50ade8b6133b3132e08e58d7685978d50
SHA1858a4d2941ce5a0316ae820203508674e70f7c00
SHA256c0db177e44639c948f1547b437df118762747c4604e7c95c44717fa827ea3049
SHA51299cb2252f1e7a905be9642d4a0c6da8d271b063fe2724ca636d2a8399fb779a554871362b7f34d396d3b5b909433ad6f34fe1ffaa54c31fc22c230788c7d2f4e
-
Filesize
94KB
MD50ade8b6133b3132e08e58d7685978d50
SHA1858a4d2941ce5a0316ae820203508674e70f7c00
SHA256c0db177e44639c948f1547b437df118762747c4604e7c95c44717fa827ea3049
SHA51299cb2252f1e7a905be9642d4a0c6da8d271b063fe2724ca636d2a8399fb779a554871362b7f34d396d3b5b909433ad6f34fe1ffaa54c31fc22c230788c7d2f4e
-
Filesize
94KB
MD50ade8b6133b3132e08e58d7685978d50
SHA1858a4d2941ce5a0316ae820203508674e70f7c00
SHA256c0db177e44639c948f1547b437df118762747c4604e7c95c44717fa827ea3049
SHA51299cb2252f1e7a905be9642d4a0c6da8d271b063fe2724ca636d2a8399fb779a554871362b7f34d396d3b5b909433ad6f34fe1ffaa54c31fc22c230788c7d2f4e
-
Filesize
94KB
MD50ade8b6133b3132e08e58d7685978d50
SHA1858a4d2941ce5a0316ae820203508674e70f7c00
SHA256c0db177e44639c948f1547b437df118762747c4604e7c95c44717fa827ea3049
SHA51299cb2252f1e7a905be9642d4a0c6da8d271b063fe2724ca636d2a8399fb779a554871362b7f34d396d3b5b909433ad6f34fe1ffaa54c31fc22c230788c7d2f4e
-
Filesize
94KB
MD50ade8b6133b3132e08e58d7685978d50
SHA1858a4d2941ce5a0316ae820203508674e70f7c00
SHA256c0db177e44639c948f1547b437df118762747c4604e7c95c44717fa827ea3049
SHA51299cb2252f1e7a905be9642d4a0c6da8d271b063fe2724ca636d2a8399fb779a554871362b7f34d396d3b5b909433ad6f34fe1ffaa54c31fc22c230788c7d2f4e