Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
20/10/2022, 12:41
Static task
static1
Behavioral task
behavioral1
Sample
1802748d085c9502a4fc7cbdd23e0c9ada2a8d841a4687b8bef6ff6ceb2409be.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1802748d085c9502a4fc7cbdd23e0c9ada2a8d841a4687b8bef6ff6ceb2409be.dll
Resource
win10v2004-20220901-en
General
-
Target
1802748d085c9502a4fc7cbdd23e0c9ada2a8d841a4687b8bef6ff6ceb2409be.dll
-
Size
454KB
-
MD5
a003aa5c85856f5d4f5ab277358ea710
-
SHA1
6845fd9cdd1d20c94918aabe87942638b7797762
-
SHA256
1802748d085c9502a4fc7cbdd23e0c9ada2a8d841a4687b8bef6ff6ceb2409be
-
SHA512
c469cdbf3ac71f0dbad89dd5c50822aa82ecd83307b0e8eef0e0d74d056119a223336f75eb192abe4b8a91916bc2beb045376a317336bd270abf7ffbe20e28a7
-
SSDEEP
12288:7xGCOXzURlbDC9K69u2m+SqOWcsQQKiY4leDDGoggH/VREG6j4Gm01b8nPCFZyQ9:twXz2aFZ3Tf
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 2104 rundll32mgr.exe 4900 rundll32mgrmgr.exe 1656 WaterMark.exe 4360 WaterMark.exe 2912 WaterMarkmgr.exe 216 WaterMark.exe -
resource yara_rule behavioral2/memory/4900-146-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4900-148-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4360-162-0x0000000000400000-0x0000000000448000-memory.dmp upx behavioral2/memory/4360-166-0x0000000000400000-0x0000000000448000-memory.dmp upx behavioral2/memory/1656-169-0x0000000000400000-0x0000000000448000-memory.dmp upx behavioral2/memory/1656-175-0x0000000000400000-0x0000000000448000-memory.dmp upx behavioral2/memory/2912-172-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4360-177-0x0000000000400000-0x0000000000448000-memory.dmp upx behavioral2/memory/2912-185-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/2104-156-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4900-155-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/1656-192-0x0000000000400000-0x0000000000448000-memory.dmp upx behavioral2/memory/216-193-0x0000000000400000-0x0000000000448000-memory.dmp upx behavioral2/memory/4360-194-0x0000000000400000-0x0000000000448000-memory.dmp upx behavioral2/memory/1656-195-0x0000000000400000-0x0000000000448000-memory.dmp upx behavioral2/memory/216-197-0x0000000000400000-0x0000000000448000-memory.dmp upx behavioral2/memory/216-196-0x0000000000400000-0x0000000000448000-memory.dmp upx behavioral2/memory/216-198-0x0000000000400000-0x0000000000448000-memory.dmp upx behavioral2/memory/4360-201-0x0000000000400000-0x0000000000448000-memory.dmp upx behavioral2/memory/4360-202-0x0000000000400000-0x0000000000448000-memory.dmp upx behavioral2/memory/1656-203-0x0000000000400000-0x0000000000448000-memory.dmp upx behavioral2/memory/1656-204-0x0000000000400000-0x0000000000448000-memory.dmp upx behavioral2/memory/216-205-0x0000000000400000-0x0000000000448000-memory.dmp upx behavioral2/memory/4360-206-0x0000000000400000-0x0000000000448000-memory.dmp upx behavioral2/memory/1656-207-0x0000000000400000-0x0000000000448000-memory.dmp upx behavioral2/memory/216-208-0x0000000000400000-0x0000000000448000-memory.dmp upx behavioral2/memory/216-209-0x0000000000400000-0x0000000000448000-memory.dmp upx behavioral2/memory/4360-210-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe File created C:\Windows\SysWOW64\rundll32mgrmgr.exe rundll32mgr.exe -
Drops file in Program Files directory 10 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\pxAD7B.tmp rundll32mgr.exe File opened for modification C:\Program Files (x86)\Microsoft\pxAD7B.tmp rundll32mgrmgr.exe File created C:\Program Files (x86)\Microsoft\WaterMark.exe rundll32mgrmgr.exe File created C:\Program Files (x86)\Microsoft\WaterMark.exe WaterMarkmgr.exe File created C:\Program Files (x86)\Microsoft\WaterMarkmgr.exe WaterMark.exe File created C:\Program Files (x86)\Microsoft\WaterMark.exe rundll32mgr.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe rundll32mgr.exe File created C:\Program Files (x86)\Microsoft\WaterMarkmgr.exe WaterMark.exe File created C:\Program Files (x86)\Microsoft\WaterMarkmgr.exe WaterMark.exe File opened for modification C:\Program Files (x86)\Microsoft\pxB069.tmp WaterMarkmgr.exe -
Program crash 4 IoCs
pid pid_target Process procid_target 3044 1408 WerFault.exe 90 2852 5024 WerFault.exe 82 3080 4352 WerFault.exe 92 4632 4240 WerFault.exe 97 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30991823" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "106206204" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30991823" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "117613040" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30991823" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30991823" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "106206204" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30991823" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "106362340" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "106362340" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30991823" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{31E17F30-51C2-11ED-A0EE-D64C4877EDD1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "117768930" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "373177977" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{31D7F7C6-51C2-11ED-A0EE-D64C4877EDD1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 4360 WaterMark.exe 4360 WaterMark.exe 4360 WaterMark.exe 4360 WaterMark.exe 1656 WaterMark.exe 1656 WaterMark.exe 1656 WaterMark.exe 1656 WaterMark.exe 216 WaterMark.exe 216 WaterMark.exe 216 WaterMark.exe 216 WaterMark.exe 4360 WaterMark.exe 4360 WaterMark.exe 4360 WaterMark.exe 4360 WaterMark.exe 4360 WaterMark.exe 4360 WaterMark.exe 4360 WaterMark.exe 4360 WaterMark.exe 4360 WaterMark.exe 4360 WaterMark.exe 4360 WaterMark.exe 4360 WaterMark.exe 1656 WaterMark.exe 1656 WaterMark.exe 1656 WaterMark.exe 1656 WaterMark.exe 1656 WaterMark.exe 1656 WaterMark.exe 1656 WaterMark.exe 1656 WaterMark.exe 1656 WaterMark.exe 1656 WaterMark.exe 1656 WaterMark.exe 1656 WaterMark.exe 216 WaterMark.exe 216 WaterMark.exe 216 WaterMark.exe 216 WaterMark.exe 216 WaterMark.exe 216 WaterMark.exe 216 WaterMark.exe 216 WaterMark.exe 216 WaterMark.exe 216 WaterMark.exe 216 WaterMark.exe 216 WaterMark.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4548 iexplore.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4360 WaterMark.exe Token: SeDebugPrivilege 1656 WaterMark.exe Token: SeDebugPrivilege 216 WaterMark.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4548 iexplore.exe 4800 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 4548 iexplore.exe 4548 iexplore.exe 4800 iexplore.exe 4800 iexplore.exe 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE -
Suspicious use of UnmapMainImage 6 IoCs
pid Process 2104 rundll32mgr.exe 4900 rundll32mgrmgr.exe 4360 WaterMark.exe 1656 WaterMark.exe 2912 WaterMarkmgr.exe 216 WaterMark.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4060 wrote to memory of 5024 4060 rundll32.exe 82 PID 4060 wrote to memory of 5024 4060 rundll32.exe 82 PID 4060 wrote to memory of 5024 4060 rundll32.exe 82 PID 5024 wrote to memory of 2104 5024 rundll32.exe 84 PID 5024 wrote to memory of 2104 5024 rundll32.exe 84 PID 5024 wrote to memory of 2104 5024 rundll32.exe 84 PID 2104 wrote to memory of 4900 2104 rundll32mgr.exe 85 PID 2104 wrote to memory of 4900 2104 rundll32mgr.exe 85 PID 2104 wrote to memory of 4900 2104 rundll32mgr.exe 85 PID 4900 wrote to memory of 4360 4900 rundll32mgrmgr.exe 88 PID 4900 wrote to memory of 4360 4900 rundll32mgrmgr.exe 88 PID 4900 wrote to memory of 4360 4900 rundll32mgrmgr.exe 88 PID 2104 wrote to memory of 1656 2104 rundll32mgr.exe 87 PID 2104 wrote to memory of 1656 2104 rundll32mgr.exe 87 PID 2104 wrote to memory of 1656 2104 rundll32mgr.exe 87 PID 1656 wrote to memory of 2912 1656 WaterMark.exe 89 PID 1656 wrote to memory of 2912 1656 WaterMark.exe 89 PID 1656 wrote to memory of 2912 1656 WaterMark.exe 89 PID 4360 wrote to memory of 1408 4360 WaterMark.exe 90 PID 4360 wrote to memory of 1408 4360 WaterMark.exe 90 PID 4360 wrote to memory of 1408 4360 WaterMark.exe 90 PID 4360 wrote to memory of 1408 4360 WaterMark.exe 90 PID 2912 wrote to memory of 216 2912 WaterMarkmgr.exe 91 PID 2912 wrote to memory of 216 2912 WaterMarkmgr.exe 91 PID 2912 wrote to memory of 216 2912 WaterMarkmgr.exe 91 PID 4360 wrote to memory of 1408 4360 WaterMark.exe 90 PID 4360 wrote to memory of 1408 4360 WaterMark.exe 90 PID 4360 wrote to memory of 1408 4360 WaterMark.exe 90 PID 4360 wrote to memory of 1408 4360 WaterMark.exe 90 PID 4360 wrote to memory of 1408 4360 WaterMark.exe 90 PID 1656 wrote to memory of 4352 1656 WaterMark.exe 92 PID 1656 wrote to memory of 4352 1656 WaterMark.exe 92 PID 1656 wrote to memory of 4352 1656 WaterMark.exe 92 PID 1656 wrote to memory of 4352 1656 WaterMark.exe 92 PID 1656 wrote to memory of 4352 1656 WaterMark.exe 92 PID 1656 wrote to memory of 4352 1656 WaterMark.exe 92 PID 1656 wrote to memory of 4352 1656 WaterMark.exe 92 PID 1656 wrote to memory of 4352 1656 WaterMark.exe 92 PID 1656 wrote to memory of 4352 1656 WaterMark.exe 92 PID 216 wrote to memory of 4240 216 WaterMark.exe 97 PID 216 wrote to memory of 4240 216 WaterMark.exe 97 PID 216 wrote to memory of 4240 216 WaterMark.exe 97 PID 216 wrote to memory of 4240 216 WaterMark.exe 97 PID 216 wrote to memory of 4240 216 WaterMark.exe 97 PID 216 wrote to memory of 4240 216 WaterMark.exe 97 PID 216 wrote to memory of 4240 216 WaterMark.exe 97 PID 216 wrote to memory of 4240 216 WaterMark.exe 97 PID 216 wrote to memory of 4240 216 WaterMark.exe 97 PID 4360 wrote to memory of 4800 4360 WaterMark.exe 103 PID 4360 wrote to memory of 4800 4360 WaterMark.exe 103 PID 4360 wrote to memory of 4548 4360 WaterMark.exe 104 PID 4360 wrote to memory of 4548 4360 WaterMark.exe 104 PID 1656 wrote to memory of 4924 1656 WaterMark.exe 105 PID 1656 wrote to memory of 4924 1656 WaterMark.exe 105 PID 1656 wrote to memory of 808 1656 WaterMark.exe 106 PID 1656 wrote to memory of 808 1656 WaterMark.exe 106 PID 4548 wrote to memory of 2092 4548 iexplore.exe 107 PID 4548 wrote to memory of 2092 4548 iexplore.exe 107 PID 4548 wrote to memory of 2092 4548 iexplore.exe 107 PID 4800 wrote to memory of 3020 4800 iexplore.exe 108 PID 4800 wrote to memory of 3020 4800 iexplore.exe 108 PID 4800 wrote to memory of 3020 4800 iexplore.exe 108 PID 216 wrote to memory of 1140 216 WaterMark.exe 109 PID 216 wrote to memory of 1140 216 WaterMark.exe 109
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1802748d085c9502a4fc7cbdd23e0c9ada2a8d841a4687b8bef6ff6ceb2409be.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1802748d085c9502a4fc7cbdd23e0c9ada2a8d841a4687b8bef6ff6ceb2409be.dll,#12⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\rundll32mgrmgr.exeC:\Windows\SysWOW64\rundll32mgrmgr.exe4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe6⤵PID:1408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1408 -s 2047⤵
- Program crash
PID:3044
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4800 CREDAT:17410 /prefetch:27⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3020
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4548 CREDAT:17410 /prefetch:27⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2092
-
-
-
-
-
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Program Files (x86)\Microsoft\WaterMarkmgr.exe"C:\Program Files (x86)\Microsoft\WaterMarkmgr.exe"5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"6⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe7⤵PID:4240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4240 -s 2048⤵
- Program crash
PID:4632
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵
- Modifies Internet Explorer settings
PID:1140
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵
- Modifies Internet Explorer settings
PID:1124
-
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe5⤵PID:4352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4352 -s 2046⤵
- Program crash
PID:3080
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Modifies Internet Explorer settings
PID:4924
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Modifies Internet Explorer settings
PID:808
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5024 -s 6283⤵
- Program crash
PID:2852
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 5024 -ip 50241⤵PID:424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 200 -p 1408 -ip 14081⤵PID:3156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4352 -ip 43521⤵PID:1788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4240 -ip 42401⤵PID:1272
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
241KB
MD5ccc1590163f5d7ecab7056a44e9db124
SHA11dcb42c050ee4bc9eb9a4576e7e74958f3b3a701
SHA256f26f3a906655f0f2ecf28e4f1ace3ed923ca3c84e58d07632c2533eb2bebca1f
SHA5125bb0db687caef40a1a918c3e859dffd314de7877827261c6957ea2f5157b8b5d7802938daa26e69d24e0725d3b4f2a145c8e4c315be6a60a611aa0cc5a41afe0
-
Filesize
241KB
MD5ccc1590163f5d7ecab7056a44e9db124
SHA11dcb42c050ee4bc9eb9a4576e7e74958f3b3a701
SHA256f26f3a906655f0f2ecf28e4f1ace3ed923ca3c84e58d07632c2533eb2bebca1f
SHA5125bb0db687caef40a1a918c3e859dffd314de7877827261c6957ea2f5157b8b5d7802938daa26e69d24e0725d3b4f2a145c8e4c315be6a60a611aa0cc5a41afe0
-
Filesize
241KB
MD5ccc1590163f5d7ecab7056a44e9db124
SHA11dcb42c050ee4bc9eb9a4576e7e74958f3b3a701
SHA256f26f3a906655f0f2ecf28e4f1ace3ed923ca3c84e58d07632c2533eb2bebca1f
SHA5125bb0db687caef40a1a918c3e859dffd314de7877827261c6957ea2f5157b8b5d7802938daa26e69d24e0725d3b4f2a145c8e4c315be6a60a611aa0cc5a41afe0
-
Filesize
241KB
MD5ccc1590163f5d7ecab7056a44e9db124
SHA11dcb42c050ee4bc9eb9a4576e7e74958f3b3a701
SHA256f26f3a906655f0f2ecf28e4f1ace3ed923ca3c84e58d07632c2533eb2bebca1f
SHA5125bb0db687caef40a1a918c3e859dffd314de7877827261c6957ea2f5157b8b5d7802938daa26e69d24e0725d3b4f2a145c8e4c315be6a60a611aa0cc5a41afe0
-
Filesize
119KB
MD5a6aa2de4617939ba1d45caf06ee26101
SHA137855db4d68303311050208ad699825466efec12
SHA25653aa56335d1c3cc1c4b0db3688c3250c4ded0611ce14bbd165544761c4a195b6
SHA512f5238d39b66af7234c6b82e5d0bd2225f329e76e6e564712beba7c7b629a19006329e764b0795d5aef7ad689ecc48096591c79996bf0991efa57294d3d29ea71
-
Filesize
119KB
MD5a6aa2de4617939ba1d45caf06ee26101
SHA137855db4d68303311050208ad699825466efec12
SHA25653aa56335d1c3cc1c4b0db3688c3250c4ded0611ce14bbd165544761c4a195b6
SHA512f5238d39b66af7234c6b82e5d0bd2225f329e76e6e564712beba7c7b629a19006329e764b0795d5aef7ad689ecc48096591c79996bf0991efa57294d3d29ea71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD57550b85aee4221c59808672005ed8855
SHA1aeb269eff06f518132b9ecea824523fa125ba2d2
SHA2562b1c1e36c5419b7b3351aad8a08fee019473c832fe242ec2bf438b160d5eb8b2
SHA512216d401cb461099f7d2f3626957800cba77308b790ec181e2affb97339570bb9e168a56f3264cad79cd60589637679728fb2a87199a91667dc3ccfd4117f2bab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD57550b85aee4221c59808672005ed8855
SHA1aeb269eff06f518132b9ecea824523fa125ba2d2
SHA2562b1c1e36c5419b7b3351aad8a08fee019473c832fe242ec2bf438b160d5eb8b2
SHA512216d401cb461099f7d2f3626957800cba77308b790ec181e2affb97339570bb9e168a56f3264cad79cd60589637679728fb2a87199a91667dc3ccfd4117f2bab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize434B
MD5a25a44e9e385d32b3a36f35a93ec4115
SHA1e7bcfead5852fa7b40d4b39038f55230fa0c02c4
SHA256dae1654fa80f929481f49bf148f3b820972fc51684cc621bf7abf2a0526e0b6a
SHA512e4b2dc4eefe232bb3e85b67a6b3c5a86f27290614fd8db0524928e7d52045b4c82c290a866ddfceb143b1afd018b8f219090d7fc2e2a924f29684fdf7587e6cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize434B
MD51590003a44fcb0f08b4b703ab4928dcd
SHA1e89bba23182d08959706cdd803a572eee57b6b22
SHA256c32bfbfec52a01857dc6b3f86cd9aa3255097f5d5ee79ab7bcdb2deea7dec93c
SHA5125d62747e41955758bed47ad029da844b132d504f21c0ae7721315e6b5580cad15ad1ef5c5a9829361a57f102d4a0a7bb8f9fd703ab9edc813e79832015875308
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{31D7F7C6-51C2-11ED-A0EE-D64C4877EDD1}.dat
Filesize3KB
MD5001a56433bbb7859572519bdfc23b5b7
SHA1919891d43bd20ed0c9650b50433b10cd418d1224
SHA256380d7a60f743a50f78689ee6e8aee3514bda43602acb7fa21b2665acb059fc34
SHA512a044580a9dba7bbf9eb07b17b6ace648afa8291079f4e169a1942d32a1623da38fa576e1977bde7be0f9b244665cd70ea82d7c0a180bed3fac6faf2532a547f1
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{31E17F30-51C2-11ED-A0EE-D64C4877EDD1}.dat
Filesize5KB
MD5ec970dbe1e1cd9c4707e5764ccc7e1bb
SHA17b160c7091de9d97ac22f6552fce6940d2eda8b8
SHA2564e67d0fa8e6fdf84866845cc680310a25dcfd64ad6e6954d7423eecf6b6c15de
SHA51298969a1554eaa2575f886c458100f63fd39b98c39d51187ee92703bd4546d9f34818154c11e314355e5d320a99732fd45373669f24c2da7c1e927af89af3c7f8
-
Filesize
241KB
MD5ccc1590163f5d7ecab7056a44e9db124
SHA11dcb42c050ee4bc9eb9a4576e7e74958f3b3a701
SHA256f26f3a906655f0f2ecf28e4f1ace3ed923ca3c84e58d07632c2533eb2bebca1f
SHA5125bb0db687caef40a1a918c3e859dffd314de7877827261c6957ea2f5157b8b5d7802938daa26e69d24e0725d3b4f2a145c8e4c315be6a60a611aa0cc5a41afe0
-
Filesize
241KB
MD5ccc1590163f5d7ecab7056a44e9db124
SHA11dcb42c050ee4bc9eb9a4576e7e74958f3b3a701
SHA256f26f3a906655f0f2ecf28e4f1ace3ed923ca3c84e58d07632c2533eb2bebca1f
SHA5125bb0db687caef40a1a918c3e859dffd314de7877827261c6957ea2f5157b8b5d7802938daa26e69d24e0725d3b4f2a145c8e4c315be6a60a611aa0cc5a41afe0
-
Filesize
119KB
MD5a6aa2de4617939ba1d45caf06ee26101
SHA137855db4d68303311050208ad699825466efec12
SHA25653aa56335d1c3cc1c4b0db3688c3250c4ded0611ce14bbd165544761c4a195b6
SHA512f5238d39b66af7234c6b82e5d0bd2225f329e76e6e564712beba7c7b629a19006329e764b0795d5aef7ad689ecc48096591c79996bf0991efa57294d3d29ea71
-
Filesize
119KB
MD5a6aa2de4617939ba1d45caf06ee26101
SHA137855db4d68303311050208ad699825466efec12
SHA25653aa56335d1c3cc1c4b0db3688c3250c4ded0611ce14bbd165544761c4a195b6
SHA512f5238d39b66af7234c6b82e5d0bd2225f329e76e6e564712beba7c7b629a19006329e764b0795d5aef7ad689ecc48096591c79996bf0991efa57294d3d29ea71