Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 17:58
Static task
static1
Behavioral task
behavioral1
Sample
9a7380188ccbf14cbd6aa76f88123fe9a413220bed60c50749a78d10908f4943.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
9a7380188ccbf14cbd6aa76f88123fe9a413220bed60c50749a78d10908f4943.exe
Resource
win10v2004-20220812-en
General
-
Target
9a7380188ccbf14cbd6aa76f88123fe9a413220bed60c50749a78d10908f4943.exe
-
Size
123KB
-
MD5
05d25f241506d0d012af900b1c80f2ac
-
SHA1
ae85d9b2266c1ee625bc47c1b6cbf8c58203f0c3
-
SHA256
9a7380188ccbf14cbd6aa76f88123fe9a413220bed60c50749a78d10908f4943
-
SHA512
4ca391e908b76a97180b49484429178912774ccee3a60839a55b194ac70ee3e2a8841620b1f4fdfd1371bb9586c710c38af261944f6e91dba1e86e198b927e87
-
SSDEEP
768:d06R0UtgnKqGR7//GPc0LOBhvBrHks3IiyhDYQbGmxlNaM+WGa1wuxnzgOYw9ICW:7R0Zn3Pc0LCH9MtbvabUDzJYWu3B
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,c:\\program files (x86)\\microsoft\\watermark.exe" svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 892 WaterMark.exe -
resource yara_rule behavioral1/memory/1696-57-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1696-58-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1696-62-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/892-79-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/892-80-0x0000000000400000-0x0000000000491000-memory.dmp upx behavioral1/memory/892-188-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 1696 9a7380188ccbf14cbd6aa76f88123fe9a413220bed60c50749a78d10908f4943.exe 1696 9a7380188ccbf14cbd6aa76f88123fe9a413220bed60c50749a78d10908f4943.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\dmlconf.dat svchost.exe File opened for modification C:\Windows\SysWOW64\dmlconf.dat svchost.exe -
Drops file in Program Files directory 10 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe 9a7380188ccbf14cbd6aa76f88123fe9a413220bed60c50749a78d10908f4943.exe File opened for modification C:\Program Files\7-Zip\7-zip32.dll svchost.exe File opened for modification C:\Program Files\7-Zip\7zG.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\pxA10.tmp 9a7380188ccbf14cbd6aa76f88123fe9a413220bed60c50749a78d10908f4943.exe File created C:\Program Files (x86)\Microsoft\WaterMark.exe 9a7380188ccbf14cbd6aa76f88123fe9a413220bed60c50749a78d10908f4943.exe File opened for modification C:\Program Files\7-Zip\7z.dll svchost.exe File opened for modification C:\Program Files\7-Zip\7z.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7-zip.dll svchost.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 892 WaterMark.exe 892 WaterMark.exe 892 WaterMark.exe 892 WaterMark.exe 892 WaterMark.exe 892 WaterMark.exe 892 WaterMark.exe 892 WaterMark.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe 2044 svchost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 892 WaterMark.exe Token: SeDebugPrivilege 2044 svchost.exe Token: SeDebugPrivilege 892 WaterMark.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1696 9a7380188ccbf14cbd6aa76f88123fe9a413220bed60c50749a78d10908f4943.exe 892 WaterMark.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1696 wrote to memory of 892 1696 9a7380188ccbf14cbd6aa76f88123fe9a413220bed60c50749a78d10908f4943.exe 27 PID 1696 wrote to memory of 892 1696 9a7380188ccbf14cbd6aa76f88123fe9a413220bed60c50749a78d10908f4943.exe 27 PID 1696 wrote to memory of 892 1696 9a7380188ccbf14cbd6aa76f88123fe9a413220bed60c50749a78d10908f4943.exe 27 PID 1696 wrote to memory of 892 1696 9a7380188ccbf14cbd6aa76f88123fe9a413220bed60c50749a78d10908f4943.exe 27 PID 892 wrote to memory of 1884 892 WaterMark.exe 28 PID 892 wrote to memory of 1884 892 WaterMark.exe 28 PID 892 wrote to memory of 1884 892 WaterMark.exe 28 PID 892 wrote to memory of 1884 892 WaterMark.exe 28 PID 892 wrote to memory of 1884 892 WaterMark.exe 28 PID 892 wrote to memory of 1884 892 WaterMark.exe 28 PID 892 wrote to memory of 1884 892 WaterMark.exe 28 PID 892 wrote to memory of 1884 892 WaterMark.exe 28 PID 892 wrote to memory of 1884 892 WaterMark.exe 28 PID 892 wrote to memory of 1884 892 WaterMark.exe 28 PID 892 wrote to memory of 2044 892 WaterMark.exe 29 PID 892 wrote to memory of 2044 892 WaterMark.exe 29 PID 892 wrote to memory of 2044 892 WaterMark.exe 29 PID 892 wrote to memory of 2044 892 WaterMark.exe 29 PID 892 wrote to memory of 2044 892 WaterMark.exe 29 PID 892 wrote to memory of 2044 892 WaterMark.exe 29 PID 892 wrote to memory of 2044 892 WaterMark.exe 29 PID 892 wrote to memory of 2044 892 WaterMark.exe 29 PID 892 wrote to memory of 2044 892 WaterMark.exe 29 PID 892 wrote to memory of 2044 892 WaterMark.exe 29 PID 2044 wrote to memory of 260 2044 svchost.exe 25 PID 2044 wrote to memory of 260 2044 svchost.exe 25 PID 2044 wrote to memory of 260 2044 svchost.exe 25 PID 2044 wrote to memory of 260 2044 svchost.exe 25 PID 2044 wrote to memory of 260 2044 svchost.exe 25 PID 2044 wrote to memory of 332 2044 svchost.exe 24 PID 2044 wrote to memory of 332 2044 svchost.exe 24 PID 2044 wrote to memory of 332 2044 svchost.exe 24 PID 2044 wrote to memory of 332 2044 svchost.exe 24 PID 2044 wrote to memory of 332 2044 svchost.exe 24 PID 2044 wrote to memory of 368 2044 svchost.exe 5 PID 2044 wrote to memory of 368 2044 svchost.exe 5 PID 2044 wrote to memory of 368 2044 svchost.exe 5 PID 2044 wrote to memory of 368 2044 svchost.exe 5 PID 2044 wrote to memory of 368 2044 svchost.exe 5 PID 2044 wrote to memory of 384 2044 svchost.exe 4 PID 2044 wrote to memory of 384 2044 svchost.exe 4 PID 2044 wrote to memory of 384 2044 svchost.exe 4 PID 2044 wrote to memory of 384 2044 svchost.exe 4 PID 2044 wrote to memory of 384 2044 svchost.exe 4 PID 2044 wrote to memory of 420 2044 svchost.exe 3 PID 2044 wrote to memory of 420 2044 svchost.exe 3 PID 2044 wrote to memory of 420 2044 svchost.exe 3 PID 2044 wrote to memory of 420 2044 svchost.exe 3 PID 2044 wrote to memory of 420 2044 svchost.exe 3 PID 2044 wrote to memory of 468 2044 svchost.exe 2 PID 2044 wrote to memory of 468 2044 svchost.exe 2 PID 2044 wrote to memory of 468 2044 svchost.exe 2 PID 2044 wrote to memory of 468 2044 svchost.exe 2 PID 2044 wrote to memory of 468 2044 svchost.exe 2 PID 2044 wrote to memory of 476 2044 svchost.exe 1 PID 2044 wrote to memory of 476 2044 svchost.exe 1 PID 2044 wrote to memory of 476 2044 svchost.exe 1 PID 2044 wrote to memory of 476 2044 svchost.exe 1 PID 2044 wrote to memory of 476 2044 svchost.exe 1 PID 2044 wrote to memory of 484 2044 svchost.exe 23 PID 2044 wrote to memory of 484 2044 svchost.exe 23 PID 2044 wrote to memory of 484 2044 svchost.exe 23 PID 2044 wrote to memory of 484 2044 svchost.exe 23 PID 2044 wrote to memory of 484 2044 svchost.exe 23
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:476
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵PID:468
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:756
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵PID:1028
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵PID:796
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵PID:952
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵PID:1232
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵PID:284
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵PID:300
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵PID:872
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵PID:832
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵PID:800
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵PID:668
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵PID:588
-
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:420
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:384
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:368
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:484
-
-
\\?\C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R1⤵PID:1840
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\9a7380188ccbf14cbd6aa76f88123fe9a413220bed60c50749a78d10908f4943.exe"C:\Users\Admin\AppData\Local\Temp\9a7380188ccbf14cbd6aa76f88123fe9a413220bed60c50749a78d10908f4943.exe"2⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe4⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Drops file in Program Files directory
PID:1884
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2044
-
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1328
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:332
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe1⤵PID:260
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
123KB
MD505d25f241506d0d012af900b1c80f2ac
SHA1ae85d9b2266c1ee625bc47c1b6cbf8c58203f0c3
SHA2569a7380188ccbf14cbd6aa76f88123fe9a413220bed60c50749a78d10908f4943
SHA5124ca391e908b76a97180b49484429178912774ccee3a60839a55b194ac70ee3e2a8841620b1f4fdfd1371bb9586c710c38af261944f6e91dba1e86e198b927e87
-
Filesize
123KB
MD505d25f241506d0d012af900b1c80f2ac
SHA1ae85d9b2266c1ee625bc47c1b6cbf8c58203f0c3
SHA2569a7380188ccbf14cbd6aa76f88123fe9a413220bed60c50749a78d10908f4943
SHA5124ca391e908b76a97180b49484429178912774ccee3a60839a55b194ac70ee3e2a8841620b1f4fdfd1371bb9586c710c38af261944f6e91dba1e86e198b927e87
-
Filesize
123KB
MD505d25f241506d0d012af900b1c80f2ac
SHA1ae85d9b2266c1ee625bc47c1b6cbf8c58203f0c3
SHA2569a7380188ccbf14cbd6aa76f88123fe9a413220bed60c50749a78d10908f4943
SHA5124ca391e908b76a97180b49484429178912774ccee3a60839a55b194ac70ee3e2a8841620b1f4fdfd1371bb9586c710c38af261944f6e91dba1e86e198b927e87
-
Filesize
123KB
MD505d25f241506d0d012af900b1c80f2ac
SHA1ae85d9b2266c1ee625bc47c1b6cbf8c58203f0c3
SHA2569a7380188ccbf14cbd6aa76f88123fe9a413220bed60c50749a78d10908f4943
SHA5124ca391e908b76a97180b49484429178912774ccee3a60839a55b194ac70ee3e2a8841620b1f4fdfd1371bb9586c710c38af261944f6e91dba1e86e198b927e87