Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
11-10-2022 00:06
Static task
static1
Behavioral task
behavioral1
Sample
a7ecd5816f5da87f214918e9c389ca55e4259fad0b6c978c5ef0b70c95f0f0e3.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a7ecd5816f5da87f214918e9c389ca55e4259fad0b6c978c5ef0b70c95f0f0e3.dll
Resource
win10v2004-20220812-en
General
-
Target
a7ecd5816f5da87f214918e9c389ca55e4259fad0b6c978c5ef0b70c95f0f0e3.dll
-
Size
212KB
-
MD5
40f196f57b767669ccd72bb230bf7c30
-
SHA1
15551a0fc08f834a8bcbe090ecf2aa5f25e0e1b5
-
SHA256
a7ecd5816f5da87f214918e9c389ca55e4259fad0b6c978c5ef0b70c95f0f0e3
-
SHA512
eb39cc463d71f1735ff2482141d69e2553d1ed4f3498a34cf5e870fa0ed12095c05a71bfc03cc10c865ed02d8193155d3c8aa9915213a267ae7d206be1f25db1
-
SSDEEP
3072:En4cV8gf2u41Z5tKlwfSrohytZZ4fGEbCP:24y8gOl2iSrowtZZmK
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,c:\\program files (x86)\\microsoft\\watermark.exe" svchost.exe -
Executes dropped EXE 2 IoCs
pid Process 840 rundll32mgr.exe 1464 WaterMark.exe -
resource yara_rule behavioral1/memory/840-64-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1464-77-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1464-185-0x0000000000400000-0x0000000000427000-memory.dmp upx -
Loads dropped DLL 4 IoCs
pid Process 1344 rundll32.exe 1344 rundll32.exe 840 rundll32mgr.exe 840 rundll32mgr.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe File created C:\Windows\SysWOW64\dmlconf.dat svchost.exe File opened for modification C:\Windows\SysWOW64\dmlconf.dat svchost.exe -
Drops file in Program Files directory 10 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\px256C.tmp rundll32mgr.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7zG.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7z.exe svchost.exe File created C:\Program Files (x86)\Microsoft\WaterMark.exe rundll32mgr.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe rundll32mgr.exe File opened for modification C:\Program Files\7-Zip\7-zip.dll svchost.exe File opened for modification C:\Program Files\7-Zip\7-zip32.dll svchost.exe File opened for modification C:\Program Files\7-Zip\7z.dll svchost.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 1464 WaterMark.exe 1464 WaterMark.exe 1464 WaterMark.exe 1464 WaterMark.exe 1464 WaterMark.exe 1464 WaterMark.exe 1464 WaterMark.exe 1464 WaterMark.exe 1376 svchost.exe 1376 svchost.exe 1376 svchost.exe 1376 svchost.exe 1376 svchost.exe 1376 svchost.exe 1376 svchost.exe 1376 svchost.exe 1376 svchost.exe 1376 svchost.exe 1376 svchost.exe 1376 svchost.exe 1376 svchost.exe 1376 svchost.exe 1376 svchost.exe 1376 svchost.exe 1376 svchost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1464 WaterMark.exe Token: SeDebugPrivilege 1376 svchost.exe Token: SeDebugPrivilege 1464 WaterMark.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1204 wrote to memory of 1344 1204 rundll32.exe 27 PID 1204 wrote to memory of 1344 1204 rundll32.exe 27 PID 1204 wrote to memory of 1344 1204 rundll32.exe 27 PID 1204 wrote to memory of 1344 1204 rundll32.exe 27 PID 1204 wrote to memory of 1344 1204 rundll32.exe 27 PID 1204 wrote to memory of 1344 1204 rundll32.exe 27 PID 1204 wrote to memory of 1344 1204 rundll32.exe 27 PID 1344 wrote to memory of 840 1344 rundll32.exe 28 PID 1344 wrote to memory of 840 1344 rundll32.exe 28 PID 1344 wrote to memory of 840 1344 rundll32.exe 28 PID 1344 wrote to memory of 840 1344 rundll32.exe 28 PID 840 wrote to memory of 1464 840 rundll32mgr.exe 29 PID 840 wrote to memory of 1464 840 rundll32mgr.exe 29 PID 840 wrote to memory of 1464 840 rundll32mgr.exe 29 PID 840 wrote to memory of 1464 840 rundll32mgr.exe 29 PID 1464 wrote to memory of 1040 1464 WaterMark.exe 30 PID 1464 wrote to memory of 1040 1464 WaterMark.exe 30 PID 1464 wrote to memory of 1040 1464 WaterMark.exe 30 PID 1464 wrote to memory of 1040 1464 WaterMark.exe 30 PID 1464 wrote to memory of 1040 1464 WaterMark.exe 30 PID 1464 wrote to memory of 1040 1464 WaterMark.exe 30 PID 1464 wrote to memory of 1040 1464 WaterMark.exe 30 PID 1464 wrote to memory of 1040 1464 WaterMark.exe 30 PID 1464 wrote to memory of 1040 1464 WaterMark.exe 30 PID 1464 wrote to memory of 1040 1464 WaterMark.exe 30 PID 1464 wrote to memory of 1376 1464 WaterMark.exe 31 PID 1464 wrote to memory of 1376 1464 WaterMark.exe 31 PID 1464 wrote to memory of 1376 1464 WaterMark.exe 31 PID 1464 wrote to memory of 1376 1464 WaterMark.exe 31 PID 1464 wrote to memory of 1376 1464 WaterMark.exe 31 PID 1464 wrote to memory of 1376 1464 WaterMark.exe 31 PID 1464 wrote to memory of 1376 1464 WaterMark.exe 31 PID 1464 wrote to memory of 1376 1464 WaterMark.exe 31 PID 1464 wrote to memory of 1376 1464 WaterMark.exe 31 PID 1464 wrote to memory of 1376 1464 WaterMark.exe 31 PID 1376 wrote to memory of 260 1376 svchost.exe 26 PID 1376 wrote to memory of 260 1376 svchost.exe 26 PID 1376 wrote to memory of 260 1376 svchost.exe 26 PID 1376 wrote to memory of 260 1376 svchost.exe 26 PID 1376 wrote to memory of 260 1376 svchost.exe 26 PID 1376 wrote to memory of 336 1376 svchost.exe 25 PID 1376 wrote to memory of 336 1376 svchost.exe 25 PID 1376 wrote to memory of 336 1376 svchost.exe 25 PID 1376 wrote to memory of 336 1376 svchost.exe 25 PID 1376 wrote to memory of 336 1376 svchost.exe 25 PID 1376 wrote to memory of 372 1376 svchost.exe 5 PID 1376 wrote to memory of 372 1376 svchost.exe 5 PID 1376 wrote to memory of 372 1376 svchost.exe 5 PID 1376 wrote to memory of 372 1376 svchost.exe 5 PID 1376 wrote to memory of 372 1376 svchost.exe 5 PID 1376 wrote to memory of 384 1376 svchost.exe 4 PID 1376 wrote to memory of 384 1376 svchost.exe 4 PID 1376 wrote to memory of 384 1376 svchost.exe 4 PID 1376 wrote to memory of 384 1376 svchost.exe 4 PID 1376 wrote to memory of 384 1376 svchost.exe 4 PID 1376 wrote to memory of 420 1376 svchost.exe 3 PID 1376 wrote to memory of 420 1376 svchost.exe 3 PID 1376 wrote to memory of 420 1376 svchost.exe 3 PID 1376 wrote to memory of 420 1376 svchost.exe 3 PID 1376 wrote to memory of 420 1376 svchost.exe 3 PID 1376 wrote to memory of 468 1376 svchost.exe 2 PID 1376 wrote to memory of 468 1376 svchost.exe 2 PID 1376 wrote to memory of 468 1376 svchost.exe 2 PID 1376 wrote to memory of 468 1376 svchost.exe 2
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:484
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵PID:468
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵PID:816
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"3⤵PID:1232
-
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵PID:768
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵PID:864
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵PID:1152
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵PID:1068
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵PID:296
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵PID:324
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=163⤵PID:336
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵PID:884
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵PID:852
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:748
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵PID:680
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵PID:600
-
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:420
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:384
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:372
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:492
-
-
\\?\C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R1⤵PID:1904
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1288
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a7ecd5816f5da87f214918e9c389ca55e4259fad0b6c978c5ef0b70c95f0f0e3.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a7ecd5816f5da87f214918e9c389ca55e4259fad0b6c978c5ef0b70c95f0f0e3.dll,#13⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe6⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Drops file in Program Files directory
PID:1040
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1376
-
-
-
-
-
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe1⤵PID:260
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
121KB
MD54b1a46af16065ad354950f16a337133e
SHA168678358e7414fdffd57d4ed072d2bb79e7687ec
SHA256d61b810f35e920beaf7b74180a0be0f92e0741746f7b99c247c37a577b8d6f7e
SHA5122edd70fd2eb835f9fafb88e0b7ca84a03dfb6b54c017fac26817b769535e5e55073e26f9964f7847f091f0bc24959836f1dbe586896ac34b3c543870fb0bc88e
-
Filesize
121KB
MD54b1a46af16065ad354950f16a337133e
SHA168678358e7414fdffd57d4ed072d2bb79e7687ec
SHA256d61b810f35e920beaf7b74180a0be0f92e0741746f7b99c247c37a577b8d6f7e
SHA5122edd70fd2eb835f9fafb88e0b7ca84a03dfb6b54c017fac26817b769535e5e55073e26f9964f7847f091f0bc24959836f1dbe586896ac34b3c543870fb0bc88e
-
Filesize
121KB
MD54b1a46af16065ad354950f16a337133e
SHA168678358e7414fdffd57d4ed072d2bb79e7687ec
SHA256d61b810f35e920beaf7b74180a0be0f92e0741746f7b99c247c37a577b8d6f7e
SHA5122edd70fd2eb835f9fafb88e0b7ca84a03dfb6b54c017fac26817b769535e5e55073e26f9964f7847f091f0bc24959836f1dbe586896ac34b3c543870fb0bc88e
-
Filesize
121KB
MD54b1a46af16065ad354950f16a337133e
SHA168678358e7414fdffd57d4ed072d2bb79e7687ec
SHA256d61b810f35e920beaf7b74180a0be0f92e0741746f7b99c247c37a577b8d6f7e
SHA5122edd70fd2eb835f9fafb88e0b7ca84a03dfb6b54c017fac26817b769535e5e55073e26f9964f7847f091f0bc24959836f1dbe586896ac34b3c543870fb0bc88e
-
Filesize
121KB
MD54b1a46af16065ad354950f16a337133e
SHA168678358e7414fdffd57d4ed072d2bb79e7687ec
SHA256d61b810f35e920beaf7b74180a0be0f92e0741746f7b99c247c37a577b8d6f7e
SHA5122edd70fd2eb835f9fafb88e0b7ca84a03dfb6b54c017fac26817b769535e5e55073e26f9964f7847f091f0bc24959836f1dbe586896ac34b3c543870fb0bc88e
-
Filesize
121KB
MD54b1a46af16065ad354950f16a337133e
SHA168678358e7414fdffd57d4ed072d2bb79e7687ec
SHA256d61b810f35e920beaf7b74180a0be0f92e0741746f7b99c247c37a577b8d6f7e
SHA5122edd70fd2eb835f9fafb88e0b7ca84a03dfb6b54c017fac26817b769535e5e55073e26f9964f7847f091f0bc24959836f1dbe586896ac34b3c543870fb0bc88e
-
Filesize
121KB
MD54b1a46af16065ad354950f16a337133e
SHA168678358e7414fdffd57d4ed072d2bb79e7687ec
SHA256d61b810f35e920beaf7b74180a0be0f92e0741746f7b99c247c37a577b8d6f7e
SHA5122edd70fd2eb835f9fafb88e0b7ca84a03dfb6b54c017fac26817b769535e5e55073e26f9964f7847f091f0bc24959836f1dbe586896ac34b3c543870fb0bc88e
-
Filesize
121KB
MD54b1a46af16065ad354950f16a337133e
SHA168678358e7414fdffd57d4ed072d2bb79e7687ec
SHA256d61b810f35e920beaf7b74180a0be0f92e0741746f7b99c247c37a577b8d6f7e
SHA5122edd70fd2eb835f9fafb88e0b7ca84a03dfb6b54c017fac26817b769535e5e55073e26f9964f7847f091f0bc24959836f1dbe586896ac34b3c543870fb0bc88e