Analysis
-
max time kernel
151s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 22:41
Static task
static1
Behavioral task
behavioral1
Sample
7f211f8b4a085511e585652eb54771b81382316da9bb7e111781e174dfd4928d.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7f211f8b4a085511e585652eb54771b81382316da9bb7e111781e174dfd4928d.dll
Resource
win10v2004-20220901-en
General
-
Target
7f211f8b4a085511e585652eb54771b81382316da9bb7e111781e174dfd4928d.dll
-
Size
460KB
-
MD5
68a1ef9c40147a51507a1114a9006c89
-
SHA1
6e5d7210b4547c66bf0d105f301ca46f34f3009f
-
SHA256
7f211f8b4a085511e585652eb54771b81382316da9bb7e111781e174dfd4928d
-
SHA512
f0025b92cd61d8f8703503058d59ae5a6157a89565e710b02f5291efd2788f2fdc10aa43bd32ce6c2124dae7ba46532a34e442d733121de9938ba59146ef79c7
-
SSDEEP
6144://gxI5p8RC6JL0OFLm1I7AV4COHEQeewQeelQeesQeeudQeefQeeZKwQBIoqhvJ8:AxI5QLM1aw4CIoqhKW6RIDUWKg/M
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,c:\\program files (x86)\\microsoft\\watermark.exe" svchost.exe -
Executes dropped EXE 2 IoCs
pid Process 1020 regsvr32mgr.exe 2044 WaterMark.exe -
resource yara_rule behavioral1/memory/1020-63-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1020-64-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1020-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1020-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1020-73-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2044-90-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2044-88-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2044-197-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Loads dropped DLL 4 IoCs
pid Process 1948 regsvr32.exe 1948 regsvr32.exe 1020 regsvr32mgr.exe 1020 regsvr32mgr.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\regsvr32mgr.exe regsvr32.exe File created C:\Windows\SysWOW64\dmlconf.dat svchost.exe File opened for modification C:\Windows\SysWOW64\dmlconf.dat svchost.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\px317D.tmp regsvr32mgr.exe File created C:\Program Files (x86)\Microsoft\WaterMark.exe regsvr32mgr.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe regsvr32mgr.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C58F1580-0DF3-401C-93B1-2D9DDA61CF04} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C58F1580-0DF3-401C-93B1-2D9DDA61CF04}\1.0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C58F1580-0DF3-401C-93B1-2D9DDA61CF04}\1.0\HELPDIR regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 2044 WaterMark.exe 2044 WaterMark.exe 2044 WaterMark.exe 2044 WaterMark.exe 2044 WaterMark.exe 2044 WaterMark.exe 2044 WaterMark.exe 2044 WaterMark.exe 896 svchost.exe 896 svchost.exe 896 svchost.exe 896 svchost.exe 896 svchost.exe 896 svchost.exe 896 svchost.exe 896 svchost.exe 896 svchost.exe 896 svchost.exe 896 svchost.exe 896 svchost.exe 896 svchost.exe 896 svchost.exe 896 svchost.exe 896 svchost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2044 WaterMark.exe Token: SeDebugPrivilege 896 svchost.exe Token: SeDebugPrivilege 2044 WaterMark.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1020 regsvr32mgr.exe 2044 WaterMark.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1612 wrote to memory of 1948 1612 regsvr32.exe 27 PID 1612 wrote to memory of 1948 1612 regsvr32.exe 27 PID 1612 wrote to memory of 1948 1612 regsvr32.exe 27 PID 1612 wrote to memory of 1948 1612 regsvr32.exe 27 PID 1612 wrote to memory of 1948 1612 regsvr32.exe 27 PID 1612 wrote to memory of 1948 1612 regsvr32.exe 27 PID 1612 wrote to memory of 1948 1612 regsvr32.exe 27 PID 1948 wrote to memory of 1020 1948 regsvr32.exe 28 PID 1948 wrote to memory of 1020 1948 regsvr32.exe 28 PID 1948 wrote to memory of 1020 1948 regsvr32.exe 28 PID 1948 wrote to memory of 1020 1948 regsvr32.exe 28 PID 1020 wrote to memory of 2044 1020 regsvr32mgr.exe 29 PID 1020 wrote to memory of 2044 1020 regsvr32mgr.exe 29 PID 1020 wrote to memory of 2044 1020 regsvr32mgr.exe 29 PID 1020 wrote to memory of 2044 1020 regsvr32mgr.exe 29 PID 2044 wrote to memory of 1976 2044 WaterMark.exe 30 PID 2044 wrote to memory of 1976 2044 WaterMark.exe 30 PID 2044 wrote to memory of 1976 2044 WaterMark.exe 30 PID 2044 wrote to memory of 1976 2044 WaterMark.exe 30 PID 2044 wrote to memory of 1976 2044 WaterMark.exe 30 PID 2044 wrote to memory of 1976 2044 WaterMark.exe 30 PID 2044 wrote to memory of 1976 2044 WaterMark.exe 30 PID 2044 wrote to memory of 1976 2044 WaterMark.exe 30 PID 2044 wrote to memory of 1976 2044 WaterMark.exe 30 PID 2044 wrote to memory of 1976 2044 WaterMark.exe 30 PID 2044 wrote to memory of 896 2044 WaterMark.exe 31 PID 2044 wrote to memory of 896 2044 WaterMark.exe 31 PID 2044 wrote to memory of 896 2044 WaterMark.exe 31 PID 2044 wrote to memory of 896 2044 WaterMark.exe 31 PID 2044 wrote to memory of 896 2044 WaterMark.exe 31 PID 2044 wrote to memory of 896 2044 WaterMark.exe 31 PID 2044 wrote to memory of 896 2044 WaterMark.exe 31 PID 2044 wrote to memory of 896 2044 WaterMark.exe 31 PID 2044 wrote to memory of 896 2044 WaterMark.exe 31 PID 2044 wrote to memory of 896 2044 WaterMark.exe 31 PID 896 wrote to memory of 260 896 svchost.exe 7 PID 896 wrote to memory of 260 896 svchost.exe 7 PID 896 wrote to memory of 260 896 svchost.exe 7 PID 896 wrote to memory of 260 896 svchost.exe 7 PID 896 wrote to memory of 260 896 svchost.exe 7 PID 896 wrote to memory of 332 896 svchost.exe 6 PID 896 wrote to memory of 332 896 svchost.exe 6 PID 896 wrote to memory of 332 896 svchost.exe 6 PID 896 wrote to memory of 332 896 svchost.exe 6 PID 896 wrote to memory of 332 896 svchost.exe 6 PID 896 wrote to memory of 368 896 svchost.exe 5 PID 896 wrote to memory of 368 896 svchost.exe 5 PID 896 wrote to memory of 368 896 svchost.exe 5 PID 896 wrote to memory of 368 896 svchost.exe 5 PID 896 wrote to memory of 368 896 svchost.exe 5 PID 896 wrote to memory of 376 896 svchost.exe 4 PID 896 wrote to memory of 376 896 svchost.exe 4 PID 896 wrote to memory of 376 896 svchost.exe 4 PID 896 wrote to memory of 376 896 svchost.exe 4 PID 896 wrote to memory of 376 896 svchost.exe 4 PID 896 wrote to memory of 416 896 svchost.exe 3 PID 896 wrote to memory of 416 896 svchost.exe 3 PID 896 wrote to memory of 416 896 svchost.exe 3 PID 896 wrote to memory of 416 896 svchost.exe 3 PID 896 wrote to memory of 416 896 svchost.exe 3 PID 896 wrote to memory of 460 896 svchost.exe 2 PID 896 wrote to memory of 460 896 svchost.exe 2 PID 896 wrote to memory of 460 896 svchost.exe 2 PID 896 wrote to memory of 460 896 svchost.exe 2
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:476
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵PID:460
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵PID:592
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵PID:1584
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵PID:1544
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵PID:1244
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵PID:1008
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵PID:296
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵PID:868
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵PID:824
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵PID:796
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:740
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵PID:652
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵PID:576
-
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:416
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:376
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:368
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:484
-
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:332
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe1⤵PID:260
-
\\?\C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R1⤵PID:1660
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1412
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\7f211f8b4a085511e585652eb54771b81382316da9bb7e111781e174dfd4928d.dll2⤵
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\7f211f8b4a085511e585652eb54771b81382316da9bb7e111781e174dfd4928d.dll3⤵
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\regsvr32mgr.exeC:\Windows\SysWOW64\regsvr32mgr.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe6⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Drops file in Program Files directory
PID:1976
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:896
-
-
-
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1348
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
119KB
MD59d5d609dc8e2554054733d19eed45c5c
SHA1ce72453fca9f477940a9def32bd8463549c6e1e4
SHA2567a85b3db04beb0c4b6a8929fdf79726bcf1084efab0a9f04a8ebaa0a2bc9e0b1
SHA512012cabde17ed1c1d1a48b5bc136591ff9c8e261e5da8bc7f67d0bd235a32150f63274362cdeef2376d2d5a38dfb0c9acc7cd3aa5244c1858b88b183f8cbe550b
-
Filesize
119KB
MD59d5d609dc8e2554054733d19eed45c5c
SHA1ce72453fca9f477940a9def32bd8463549c6e1e4
SHA2567a85b3db04beb0c4b6a8929fdf79726bcf1084efab0a9f04a8ebaa0a2bc9e0b1
SHA512012cabde17ed1c1d1a48b5bc136591ff9c8e261e5da8bc7f67d0bd235a32150f63274362cdeef2376d2d5a38dfb0c9acc7cd3aa5244c1858b88b183f8cbe550b
-
Filesize
119KB
MD59d5d609dc8e2554054733d19eed45c5c
SHA1ce72453fca9f477940a9def32bd8463549c6e1e4
SHA2567a85b3db04beb0c4b6a8929fdf79726bcf1084efab0a9f04a8ebaa0a2bc9e0b1
SHA512012cabde17ed1c1d1a48b5bc136591ff9c8e261e5da8bc7f67d0bd235a32150f63274362cdeef2376d2d5a38dfb0c9acc7cd3aa5244c1858b88b183f8cbe550b
-
Filesize
119KB
MD59d5d609dc8e2554054733d19eed45c5c
SHA1ce72453fca9f477940a9def32bd8463549c6e1e4
SHA2567a85b3db04beb0c4b6a8929fdf79726bcf1084efab0a9f04a8ebaa0a2bc9e0b1
SHA512012cabde17ed1c1d1a48b5bc136591ff9c8e261e5da8bc7f67d0bd235a32150f63274362cdeef2376d2d5a38dfb0c9acc7cd3aa5244c1858b88b183f8cbe550b
-
Filesize
119KB
MD59d5d609dc8e2554054733d19eed45c5c
SHA1ce72453fca9f477940a9def32bd8463549c6e1e4
SHA2567a85b3db04beb0c4b6a8929fdf79726bcf1084efab0a9f04a8ebaa0a2bc9e0b1
SHA512012cabde17ed1c1d1a48b5bc136591ff9c8e261e5da8bc7f67d0bd235a32150f63274362cdeef2376d2d5a38dfb0c9acc7cd3aa5244c1858b88b183f8cbe550b
-
Filesize
119KB
MD59d5d609dc8e2554054733d19eed45c5c
SHA1ce72453fca9f477940a9def32bd8463549c6e1e4
SHA2567a85b3db04beb0c4b6a8929fdf79726bcf1084efab0a9f04a8ebaa0a2bc9e0b1
SHA512012cabde17ed1c1d1a48b5bc136591ff9c8e261e5da8bc7f67d0bd235a32150f63274362cdeef2376d2d5a38dfb0c9acc7cd3aa5244c1858b88b183f8cbe550b
-
Filesize
119KB
MD59d5d609dc8e2554054733d19eed45c5c
SHA1ce72453fca9f477940a9def32bd8463549c6e1e4
SHA2567a85b3db04beb0c4b6a8929fdf79726bcf1084efab0a9f04a8ebaa0a2bc9e0b1
SHA512012cabde17ed1c1d1a48b5bc136591ff9c8e261e5da8bc7f67d0bd235a32150f63274362cdeef2376d2d5a38dfb0c9acc7cd3aa5244c1858b88b183f8cbe550b
-
Filesize
119KB
MD59d5d609dc8e2554054733d19eed45c5c
SHA1ce72453fca9f477940a9def32bd8463549c6e1e4
SHA2567a85b3db04beb0c4b6a8929fdf79726bcf1084efab0a9f04a8ebaa0a2bc9e0b1
SHA512012cabde17ed1c1d1a48b5bc136591ff9c8e261e5da8bc7f67d0bd235a32150f63274362cdeef2376d2d5a38dfb0c9acc7cd3aa5244c1858b88b183f8cbe550b