Analysis
-
max time kernel
152s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
21/10/2022, 00:18
Static task
static1
Behavioral task
behavioral1
Sample
4ea0ce5010953b6802f03530990562806d9143d4e46aa94181f7f554cd02dd21.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4ea0ce5010953b6802f03530990562806d9143d4e46aa94181f7f554cd02dd21.dll
Resource
win10v2004-20220901-en
General
-
Target
4ea0ce5010953b6802f03530990562806d9143d4e46aa94181f7f554cd02dd21.dll
-
Size
264KB
-
MD5
4d4d0ff5d86174ef08639d48442ae11f
-
SHA1
6c882b7a83baa0bcc0aeeabe3fe132d09ea56cd2
-
SHA256
4ea0ce5010953b6802f03530990562806d9143d4e46aa94181f7f554cd02dd21
-
SHA512
b10ba607958df890984246e3976317c74bd6f98dc993a18c66618ab4211925afda9ef3115d3aaf9c53b0bcf54d74bec7d413ddf339ace9b33399e2e890f467b9
-
SSDEEP
3072:KZmu9K33WSwdJ/tILtAPrL+oxdvTjD4NRSxEdlIkFmTkQV1FXRCSGufV0mlstx:K8b33QqUrSAo26c/1FCu90ms
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,c:\\program files (x86)\\microsoft\\watermark.exe" svchost.exe -
Executes dropped EXE 2 IoCs
pid Process 1712 rundll32mgr.exe 1076 WaterMark.exe -
resource yara_rule behavioral1/memory/1712-63-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1712-62-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1712-69-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1076-86-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral1/memory/1076-84-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral1/memory/1076-197-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Loads dropped DLL 4 IoCs
pid Process 668 rundll32.exe 668 rundll32.exe 1712 rundll32mgr.exe 1712 rundll32mgr.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe File created C:\Windows\SysWOW64\dmlconf.dat svchost.exe File opened for modification C:\Windows\SysWOW64\dmlconf.dat svchost.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\pxC22.tmp rundll32mgr.exe File created C:\Program Files (x86)\Microsoft\WaterMark.exe rundll32mgr.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe rundll32mgr.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe svchost.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 1076 WaterMark.exe 1076 WaterMark.exe 1076 WaterMark.exe 1076 WaterMark.exe 1076 WaterMark.exe 1076 WaterMark.exe 1076 WaterMark.exe 1076 WaterMark.exe 652 svchost.exe 652 svchost.exe 652 svchost.exe 652 svchost.exe 652 svchost.exe 652 svchost.exe 652 svchost.exe 652 svchost.exe 652 svchost.exe 652 svchost.exe 652 svchost.exe 652 svchost.exe 652 svchost.exe 652 svchost.exe 652 svchost.exe 652 svchost.exe 652 svchost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1076 WaterMark.exe Token: SeDebugPrivilege 652 svchost.exe Token: SeDebugPrivilege 1076 WaterMark.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1712 rundll32mgr.exe 1076 WaterMark.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1952 wrote to memory of 668 1952 rundll32.exe 28 PID 1952 wrote to memory of 668 1952 rundll32.exe 28 PID 1952 wrote to memory of 668 1952 rundll32.exe 28 PID 1952 wrote to memory of 668 1952 rundll32.exe 28 PID 1952 wrote to memory of 668 1952 rundll32.exe 28 PID 1952 wrote to memory of 668 1952 rundll32.exe 28 PID 1952 wrote to memory of 668 1952 rundll32.exe 28 PID 668 wrote to memory of 1712 668 rundll32.exe 29 PID 668 wrote to memory of 1712 668 rundll32.exe 29 PID 668 wrote to memory of 1712 668 rundll32.exe 29 PID 668 wrote to memory of 1712 668 rundll32.exe 29 PID 1712 wrote to memory of 1076 1712 rundll32mgr.exe 30 PID 1712 wrote to memory of 1076 1712 rundll32mgr.exe 30 PID 1712 wrote to memory of 1076 1712 rundll32mgr.exe 30 PID 1712 wrote to memory of 1076 1712 rundll32mgr.exe 30 PID 1076 wrote to memory of 2040 1076 WaterMark.exe 31 PID 1076 wrote to memory of 2040 1076 WaterMark.exe 31 PID 1076 wrote to memory of 2040 1076 WaterMark.exe 31 PID 1076 wrote to memory of 2040 1076 WaterMark.exe 31 PID 1076 wrote to memory of 2040 1076 WaterMark.exe 31 PID 1076 wrote to memory of 2040 1076 WaterMark.exe 31 PID 1076 wrote to memory of 2040 1076 WaterMark.exe 31 PID 1076 wrote to memory of 2040 1076 WaterMark.exe 31 PID 1076 wrote to memory of 2040 1076 WaterMark.exe 31 PID 1076 wrote to memory of 2040 1076 WaterMark.exe 31 PID 1076 wrote to memory of 652 1076 WaterMark.exe 32 PID 1076 wrote to memory of 652 1076 WaterMark.exe 32 PID 1076 wrote to memory of 652 1076 WaterMark.exe 32 PID 1076 wrote to memory of 652 1076 WaterMark.exe 32 PID 1076 wrote to memory of 652 1076 WaterMark.exe 32 PID 1076 wrote to memory of 652 1076 WaterMark.exe 32 PID 1076 wrote to memory of 652 1076 WaterMark.exe 32 PID 1076 wrote to memory of 652 1076 WaterMark.exe 32 PID 1076 wrote to memory of 652 1076 WaterMark.exe 32 PID 1076 wrote to memory of 652 1076 WaterMark.exe 32 PID 652 wrote to memory of 260 652 svchost.exe 6 PID 652 wrote to memory of 260 652 svchost.exe 6 PID 652 wrote to memory of 260 652 svchost.exe 6 PID 652 wrote to memory of 260 652 svchost.exe 6 PID 652 wrote to memory of 260 652 svchost.exe 6 PID 652 wrote to memory of 332 652 svchost.exe 5 PID 652 wrote to memory of 332 652 svchost.exe 5 PID 652 wrote to memory of 332 652 svchost.exe 5 PID 652 wrote to memory of 332 652 svchost.exe 5 PID 652 wrote to memory of 332 652 svchost.exe 5 PID 652 wrote to memory of 368 652 svchost.exe 4 PID 652 wrote to memory of 368 652 svchost.exe 4 PID 652 wrote to memory of 368 652 svchost.exe 4 PID 652 wrote to memory of 368 652 svchost.exe 4 PID 652 wrote to memory of 368 652 svchost.exe 4 PID 652 wrote to memory of 380 652 svchost.exe 3 PID 652 wrote to memory of 380 652 svchost.exe 3 PID 652 wrote to memory of 380 652 svchost.exe 3 PID 652 wrote to memory of 380 652 svchost.exe 3 PID 652 wrote to memory of 380 652 svchost.exe 3 PID 652 wrote to memory of 416 652 svchost.exe 2 PID 652 wrote to memory of 416 652 svchost.exe 2 PID 652 wrote to memory of 416 652 svchost.exe 2 PID 652 wrote to memory of 416 652 svchost.exe 2 PID 652 wrote to memory of 416 652 svchost.exe 2 PID 652 wrote to memory of 460 652 svchost.exe 1 PID 652 wrote to memory of 460 652 svchost.exe 1 PID 652 wrote to memory of 460 652 svchost.exe 1 PID 652 wrote to memory of 460 652 svchost.exe 1
Processes
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵PID:460
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵PID:952
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵PID:964
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵PID:1192
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵PID:1036
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵PID:360
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵PID:296
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵PID:860
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵PID:836
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵PID:788
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:720
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵PID:656
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵PID:580
-
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:416
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:380
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:368
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe2⤵PID:476
-
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:484
-
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:332
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe1⤵PID:260
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe1⤵PID:1912
-
\\?\C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R1⤵PID:1956
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4ea0ce5010953b6802f03530990562806d9143d4e46aa94181f7f554cd02dd21.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4ea0ce5010953b6802f03530990562806d9143d4e46aa94181f7f554cd02dd21.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe5⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Drops file in Program Files directory
PID:2040
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:652
-
-
-
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1324
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1272
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
119KB
MD5b313c611c4280feba76564194b05c1eb
SHA116d9cbab9fb369ddcd6f6e33cdaf977fe3d34c8c
SHA256bd7b3cb1c8d032fe5dddbe74ce0cba8df770b7545e550f6bf216ab2cdd4ff87f
SHA512691d9d8f27e83df242216087362f45d35e7387ec56169bd9af5b9309838be70c5c042fe6bc9c0152db870696df0a0e4f369950dd9d18c65403c72d8293f74f0b
-
Filesize
119KB
MD5b313c611c4280feba76564194b05c1eb
SHA116d9cbab9fb369ddcd6f6e33cdaf977fe3d34c8c
SHA256bd7b3cb1c8d032fe5dddbe74ce0cba8df770b7545e550f6bf216ab2cdd4ff87f
SHA512691d9d8f27e83df242216087362f45d35e7387ec56169bd9af5b9309838be70c5c042fe6bc9c0152db870696df0a0e4f369950dd9d18c65403c72d8293f74f0b
-
Filesize
119KB
MD5b313c611c4280feba76564194b05c1eb
SHA116d9cbab9fb369ddcd6f6e33cdaf977fe3d34c8c
SHA256bd7b3cb1c8d032fe5dddbe74ce0cba8df770b7545e550f6bf216ab2cdd4ff87f
SHA512691d9d8f27e83df242216087362f45d35e7387ec56169bd9af5b9309838be70c5c042fe6bc9c0152db870696df0a0e4f369950dd9d18c65403c72d8293f74f0b
-
Filesize
119KB
MD5b313c611c4280feba76564194b05c1eb
SHA116d9cbab9fb369ddcd6f6e33cdaf977fe3d34c8c
SHA256bd7b3cb1c8d032fe5dddbe74ce0cba8df770b7545e550f6bf216ab2cdd4ff87f
SHA512691d9d8f27e83df242216087362f45d35e7387ec56169bd9af5b9309838be70c5c042fe6bc9c0152db870696df0a0e4f369950dd9d18c65403c72d8293f74f0b
-
Filesize
119KB
MD5b313c611c4280feba76564194b05c1eb
SHA116d9cbab9fb369ddcd6f6e33cdaf977fe3d34c8c
SHA256bd7b3cb1c8d032fe5dddbe74ce0cba8df770b7545e550f6bf216ab2cdd4ff87f
SHA512691d9d8f27e83df242216087362f45d35e7387ec56169bd9af5b9309838be70c5c042fe6bc9c0152db870696df0a0e4f369950dd9d18c65403c72d8293f74f0b
-
Filesize
119KB
MD5b313c611c4280feba76564194b05c1eb
SHA116d9cbab9fb369ddcd6f6e33cdaf977fe3d34c8c
SHA256bd7b3cb1c8d032fe5dddbe74ce0cba8df770b7545e550f6bf216ab2cdd4ff87f
SHA512691d9d8f27e83df242216087362f45d35e7387ec56169bd9af5b9309838be70c5c042fe6bc9c0152db870696df0a0e4f369950dd9d18c65403c72d8293f74f0b
-
Filesize
119KB
MD5b313c611c4280feba76564194b05c1eb
SHA116d9cbab9fb369ddcd6f6e33cdaf977fe3d34c8c
SHA256bd7b3cb1c8d032fe5dddbe74ce0cba8df770b7545e550f6bf216ab2cdd4ff87f
SHA512691d9d8f27e83df242216087362f45d35e7387ec56169bd9af5b9309838be70c5c042fe6bc9c0152db870696df0a0e4f369950dd9d18c65403c72d8293f74f0b
-
Filesize
119KB
MD5b313c611c4280feba76564194b05c1eb
SHA116d9cbab9fb369ddcd6f6e33cdaf977fe3d34c8c
SHA256bd7b3cb1c8d032fe5dddbe74ce0cba8df770b7545e550f6bf216ab2cdd4ff87f
SHA512691d9d8f27e83df242216087362f45d35e7387ec56169bd9af5b9309838be70c5c042fe6bc9c0152db870696df0a0e4f369950dd9d18c65403c72d8293f74f0b