Analysis
-
max time kernel
151s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 12:08
Static task
static1
Behavioral task
behavioral1
Sample
975c4ffb679d9c4c0cbd70278feeb2ac8751c47d9eea1ecc1cb3cbf0e53fd2b2.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
975c4ffb679d9c4c0cbd70278feeb2ac8751c47d9eea1ecc1cb3cbf0e53fd2b2.dll
Resource
win10v2004-20220812-en
General
-
Target
975c4ffb679d9c4c0cbd70278feeb2ac8751c47d9eea1ecc1cb3cbf0e53fd2b2.dll
-
Size
580KB
-
MD5
478a7852e7adc042bcdc773a9657653c
-
SHA1
3ab493a5ad63a60fe12d2a64c6bfe8779fb5ab14
-
SHA256
975c4ffb679d9c4c0cbd70278feeb2ac8751c47d9eea1ecc1cb3cbf0e53fd2b2
-
SHA512
35fec9a55ee2a2bef76f28e9989df35185780e82649490b30dea109aa99a8f4ad8bad07b39339d41dbed651abd48b884635cbbbff244db8d80e1cdd23be52784
-
SSDEEP
12288:ShpUrEIZJqr1AkBWwNa5R0EYl795/amaX3QXaPKUuZKn:S/jG01NHXaP6Zk
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,c:\\program files (x86)\\microsoft\\watermark.exe" svchost.exe -
Executes dropped EXE 2 IoCs
pid Process 860 rundll32mgr.exe 1492 WaterMark.exe -
resource yara_rule behavioral1/memory/860-65-0x0000000000400000-0x0000000000431378-memory.dmp upx behavioral1/memory/1492-81-0x0000000000400000-0x0000000000431378-memory.dmp upx behavioral1/memory/1492-201-0x0000000000400000-0x0000000000431378-memory.dmp upx -
Loads dropped DLL 4 IoCs
pid Process 1120 rundll32.exe 1120 rundll32.exe 860 rundll32mgr.exe 860 rundll32mgr.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe File created C:\Windows\SysWOW64\dmlconf.dat svchost.exe File opened for modification C:\Windows\SysWOW64\dmlconf.dat svchost.exe -
Drops file in Program Files directory 10 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\7z.dll svchost.exe File opened for modification C:\Program Files\7-Zip\7z.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7zG.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe rundll32mgr.exe File created C:\Program Files (x86)\Microsoft\WaterMark.exe rundll32mgr.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7-zip.dll svchost.exe File opened for modification C:\Program Files\7-Zip\7-zip32.dll svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\px6614.tmp rundll32mgr.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 628 1120 WerFault.exe 26 -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 1492 WaterMark.exe 1492 WaterMark.exe 1492 WaterMark.exe 1492 WaterMark.exe 1492 WaterMark.exe 1492 WaterMark.exe 1492 WaterMark.exe 1492 WaterMark.exe 696 svchost.exe 696 svchost.exe 696 svchost.exe 696 svchost.exe 696 svchost.exe 696 svchost.exe 696 svchost.exe 696 svchost.exe 696 svchost.exe 696 svchost.exe 696 svchost.exe 696 svchost.exe 696 svchost.exe 696 svchost.exe 696 svchost.exe 696 svchost.exe 696 svchost.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1492 WaterMark.exe Token: SeDebugPrivilege 696 svchost.exe Token: SeDebugPrivilege 1120 rundll32.exe Token: SeDebugPrivilege 628 WerFault.exe Token: SeDebugPrivilege 1492 WaterMark.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1248 wrote to memory of 1120 1248 rundll32.exe 26 PID 1248 wrote to memory of 1120 1248 rundll32.exe 26 PID 1248 wrote to memory of 1120 1248 rundll32.exe 26 PID 1248 wrote to memory of 1120 1248 rundll32.exe 26 PID 1248 wrote to memory of 1120 1248 rundll32.exe 26 PID 1248 wrote to memory of 1120 1248 rundll32.exe 26 PID 1248 wrote to memory of 1120 1248 rundll32.exe 26 PID 1120 wrote to memory of 860 1120 rundll32.exe 27 PID 1120 wrote to memory of 860 1120 rundll32.exe 27 PID 1120 wrote to memory of 860 1120 rundll32.exe 27 PID 1120 wrote to memory of 860 1120 rundll32.exe 27 PID 860 wrote to memory of 1492 860 rundll32mgr.exe 29 PID 860 wrote to memory of 1492 860 rundll32mgr.exe 29 PID 860 wrote to memory of 1492 860 rundll32mgr.exe 29 PID 860 wrote to memory of 1492 860 rundll32mgr.exe 29 PID 1120 wrote to memory of 628 1120 rundll32.exe 28 PID 1120 wrote to memory of 628 1120 rundll32.exe 28 PID 1120 wrote to memory of 628 1120 rundll32.exe 28 PID 1120 wrote to memory of 628 1120 rundll32.exe 28 PID 1492 wrote to memory of 272 1492 WaterMark.exe 30 PID 1492 wrote to memory of 272 1492 WaterMark.exe 30 PID 1492 wrote to memory of 272 1492 WaterMark.exe 30 PID 1492 wrote to memory of 272 1492 WaterMark.exe 30 PID 1492 wrote to memory of 272 1492 WaterMark.exe 30 PID 1492 wrote to memory of 272 1492 WaterMark.exe 30 PID 1492 wrote to memory of 272 1492 WaterMark.exe 30 PID 1492 wrote to memory of 272 1492 WaterMark.exe 30 PID 1492 wrote to memory of 272 1492 WaterMark.exe 30 PID 1492 wrote to memory of 272 1492 WaterMark.exe 30 PID 1492 wrote to memory of 696 1492 WaterMark.exe 31 PID 1492 wrote to memory of 696 1492 WaterMark.exe 31 PID 1492 wrote to memory of 696 1492 WaterMark.exe 31 PID 1492 wrote to memory of 696 1492 WaterMark.exe 31 PID 1492 wrote to memory of 696 1492 WaterMark.exe 31 PID 1492 wrote to memory of 696 1492 WaterMark.exe 31 PID 1492 wrote to memory of 696 1492 WaterMark.exe 31 PID 1492 wrote to memory of 696 1492 WaterMark.exe 31 PID 1492 wrote to memory of 696 1492 WaterMark.exe 31 PID 1492 wrote to memory of 696 1492 WaterMark.exe 31 PID 696 wrote to memory of 260 696 svchost.exe 7 PID 696 wrote to memory of 260 696 svchost.exe 7 PID 696 wrote to memory of 260 696 svchost.exe 7 PID 696 wrote to memory of 260 696 svchost.exe 7 PID 696 wrote to memory of 260 696 svchost.exe 7 PID 696 wrote to memory of 332 696 svchost.exe 6 PID 696 wrote to memory of 332 696 svchost.exe 6 PID 696 wrote to memory of 332 696 svchost.exe 6 PID 696 wrote to memory of 332 696 svchost.exe 6 PID 696 wrote to memory of 332 696 svchost.exe 6 PID 696 wrote to memory of 368 696 svchost.exe 5 PID 696 wrote to memory of 368 696 svchost.exe 5 PID 696 wrote to memory of 368 696 svchost.exe 5 PID 696 wrote to memory of 368 696 svchost.exe 5 PID 696 wrote to memory of 368 696 svchost.exe 5 PID 696 wrote to memory of 376 696 svchost.exe 4 PID 696 wrote to memory of 376 696 svchost.exe 4 PID 696 wrote to memory of 376 696 svchost.exe 4 PID 696 wrote to memory of 376 696 svchost.exe 4 PID 696 wrote to memory of 376 696 svchost.exe 4 PID 696 wrote to memory of 416 696 svchost.exe 3 PID 696 wrote to memory of 416 696 svchost.exe 3 PID 696 wrote to memory of 416 696 svchost.exe 3 PID 696 wrote to memory of 416 696 svchost.exe 3 PID 696 wrote to memory of 416 696 svchost.exe 3
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:480
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵PID:460
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵PID:676
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵PID:848
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵PID:336
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵PID:1300
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵PID:1696
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵PID:1800
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵PID:1036
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵PID:328
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵PID:884
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵PID:812
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:752
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵PID:596
-
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:416
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:376
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:368
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:488
-
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:332
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe1⤵PID:260
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1444
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\975c4ffb679d9c4c0cbd70278feeb2ac8751c47d9eea1ecc1cb3cbf0e53fd2b2.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\975c4ffb679d9c4c0cbd70278feeb2ac8751c47d9eea1ecc1cb3cbf0e53fd2b2.dll,#13⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe6⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Drops file in Program Files directory
PID:272
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:696
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1120 -s 2364⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:628
-
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1404
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120KB
MD5132fd3d6c8b1ec1897383745f524b9de
SHA120d5fdaecc63300ea555e60ea2efd6921aa1fbf7
SHA2560d07bd485789ff6d432c445290c343fc98ae86ecb8a46cf5952f796839242fdf
SHA512d95b6796ca5f96871c4e3b265ffc89e5665b05dec1fe5299c4fe51c6e5ecc69daea0bd2159a87b6529ffec9af6562fda7c714bb02c431962ec163ce0784e75da
-
Filesize
120KB
MD5132fd3d6c8b1ec1897383745f524b9de
SHA120d5fdaecc63300ea555e60ea2efd6921aa1fbf7
SHA2560d07bd485789ff6d432c445290c343fc98ae86ecb8a46cf5952f796839242fdf
SHA512d95b6796ca5f96871c4e3b265ffc89e5665b05dec1fe5299c4fe51c6e5ecc69daea0bd2159a87b6529ffec9af6562fda7c714bb02c431962ec163ce0784e75da
-
Filesize
120KB
MD5132fd3d6c8b1ec1897383745f524b9de
SHA120d5fdaecc63300ea555e60ea2efd6921aa1fbf7
SHA2560d07bd485789ff6d432c445290c343fc98ae86ecb8a46cf5952f796839242fdf
SHA512d95b6796ca5f96871c4e3b265ffc89e5665b05dec1fe5299c4fe51c6e5ecc69daea0bd2159a87b6529ffec9af6562fda7c714bb02c431962ec163ce0784e75da
-
Filesize
120KB
MD5132fd3d6c8b1ec1897383745f524b9de
SHA120d5fdaecc63300ea555e60ea2efd6921aa1fbf7
SHA2560d07bd485789ff6d432c445290c343fc98ae86ecb8a46cf5952f796839242fdf
SHA512d95b6796ca5f96871c4e3b265ffc89e5665b05dec1fe5299c4fe51c6e5ecc69daea0bd2159a87b6529ffec9af6562fda7c714bb02c431962ec163ce0784e75da
-
Filesize
120KB
MD5132fd3d6c8b1ec1897383745f524b9de
SHA120d5fdaecc63300ea555e60ea2efd6921aa1fbf7
SHA2560d07bd485789ff6d432c445290c343fc98ae86ecb8a46cf5952f796839242fdf
SHA512d95b6796ca5f96871c4e3b265ffc89e5665b05dec1fe5299c4fe51c6e5ecc69daea0bd2159a87b6529ffec9af6562fda7c714bb02c431962ec163ce0784e75da
-
Filesize
120KB
MD5132fd3d6c8b1ec1897383745f524b9de
SHA120d5fdaecc63300ea555e60ea2efd6921aa1fbf7
SHA2560d07bd485789ff6d432c445290c343fc98ae86ecb8a46cf5952f796839242fdf
SHA512d95b6796ca5f96871c4e3b265ffc89e5665b05dec1fe5299c4fe51c6e5ecc69daea0bd2159a87b6529ffec9af6562fda7c714bb02c431962ec163ce0784e75da
-
Filesize
120KB
MD5132fd3d6c8b1ec1897383745f524b9de
SHA120d5fdaecc63300ea555e60ea2efd6921aa1fbf7
SHA2560d07bd485789ff6d432c445290c343fc98ae86ecb8a46cf5952f796839242fdf
SHA512d95b6796ca5f96871c4e3b265ffc89e5665b05dec1fe5299c4fe51c6e5ecc69daea0bd2159a87b6529ffec9af6562fda7c714bb02c431962ec163ce0784e75da
-
Filesize
120KB
MD5132fd3d6c8b1ec1897383745f524b9de
SHA120d5fdaecc63300ea555e60ea2efd6921aa1fbf7
SHA2560d07bd485789ff6d432c445290c343fc98ae86ecb8a46cf5952f796839242fdf
SHA512d95b6796ca5f96871c4e3b265ffc89e5665b05dec1fe5299c4fe51c6e5ecc69daea0bd2159a87b6529ffec9af6562fda7c714bb02c431962ec163ce0784e75da