Analysis
-
max time kernel
152s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
29/10/2022, 17:36
Static task
static1
Behavioral task
behavioral1
Sample
0eac8023f7f98d02be864e0a0e04b98237caba618635ea8db98b20e79526c9ad.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
0eac8023f7f98d02be864e0a0e04b98237caba618635ea8db98b20e79526c9ad.dll
Resource
win10v2004-20220812-en
General
-
Target
0eac8023f7f98d02be864e0a0e04b98237caba618635ea8db98b20e79526c9ad.dll
-
Size
436KB
-
MD5
8481ba4dc48607484e7b6fc3f8c989d5
-
SHA1
a2fb92290d332487853108ff9e2b662497ed497f
-
SHA256
0eac8023f7f98d02be864e0a0e04b98237caba618635ea8db98b20e79526c9ad
-
SHA512
9ed899abb2c55c02c0b397f05fc58c4c117647f9a33331c2ffbeb71938ee78932e388c55b03234d523b76757439fe5d69f4431a5279384b77e19b1596ffc13c2
-
SSDEEP
12288:5lVvN1QWguohInJDrn8zwNF7eCrANFe+1hI:z2Sxrn80NF77ANE
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,c:\\program files (x86)\\microsoft\\watermark.exe" svchost.exe -
Executes dropped EXE 2 IoCs
pid Process 1168 rundll32Srv.exe 772 WaterMark.exe -
resource yara_rule behavioral1/files/0x000500000000b2d2-56.dat upx behavioral1/files/0x000500000000b2d2-57.dat upx behavioral1/files/0x000500000000b2d2-59.dat upx behavioral1/memory/1168-63-0x0000000000400000-0x0000000000441000-memory.dmp upx behavioral1/files/0x000500000000b2d2-64.dat upx behavioral1/files/0x000a00000001230f-65.dat upx behavioral1/files/0x000a00000001230f-66.dat upx behavioral1/files/0x000a00000001230f-69.dat upx behavioral1/memory/1168-68-0x0000000000400000-0x0000000000441000-memory.dmp upx behavioral1/files/0x000a00000001230f-70.dat upx behavioral1/memory/772-80-0x0000000000400000-0x0000000000441000-memory.dmp upx behavioral1/memory/772-210-0x0000000000400000-0x0000000000441000-memory.dmp upx -
Loads dropped DLL 4 IoCs
pid Process 1352 rundll32.exe 1352 rundll32.exe 1168 rundll32Srv.exe 1168 rundll32Srv.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32Srv.exe rundll32.exe File created C:\Windows\SysWOW64\dmlconf.dat svchost.exe File opened for modification C:\Windows\SysWOW64\dmlconf.dat svchost.exe -
Drops file in Program Files directory 10 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\7z.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7zG.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe rundll32Srv.exe File opened for modification C:\Program Files\7-Zip\7-zip32.dll svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7-zip.dll svchost.exe File opened for modification C:\Program Files\7-Zip\7z.dll svchost.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\px1BBC.tmp rundll32Srv.exe File created C:\Program Files (x86)\Microsoft\WaterMark.exe rundll32Srv.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1160 1352 WerFault.exe 27 -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 772 WaterMark.exe 772 WaterMark.exe 772 WaterMark.exe 772 WaterMark.exe 772 WaterMark.exe 772 WaterMark.exe 772 WaterMark.exe 772 WaterMark.exe 988 svchost.exe 988 svchost.exe 988 svchost.exe 988 svchost.exe 988 svchost.exe 988 svchost.exe 988 svchost.exe 988 svchost.exe 988 svchost.exe 988 svchost.exe 988 svchost.exe 988 svchost.exe 988 svchost.exe 988 svchost.exe 988 svchost.exe 988 svchost.exe 988 svchost.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 772 WaterMark.exe Token: SeDebugPrivilege 988 svchost.exe Token: SeDebugPrivilege 1352 rundll32.exe Token: SeDebugPrivilege 1160 WerFault.exe Token: SeDebugPrivilege 772 WaterMark.exe Token: SeDebugPrivilege 584 svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1324 wrote to memory of 1352 1324 rundll32.exe 27 PID 1324 wrote to memory of 1352 1324 rundll32.exe 27 PID 1324 wrote to memory of 1352 1324 rundll32.exe 27 PID 1324 wrote to memory of 1352 1324 rundll32.exe 27 PID 1324 wrote to memory of 1352 1324 rundll32.exe 27 PID 1324 wrote to memory of 1352 1324 rundll32.exe 27 PID 1324 wrote to memory of 1352 1324 rundll32.exe 27 PID 1352 wrote to memory of 1168 1352 rundll32.exe 28 PID 1352 wrote to memory of 1168 1352 rundll32.exe 28 PID 1352 wrote to memory of 1168 1352 rundll32.exe 28 PID 1352 wrote to memory of 1168 1352 rundll32.exe 28 PID 1352 wrote to memory of 1160 1352 rundll32.exe 29 PID 1352 wrote to memory of 1160 1352 rundll32.exe 29 PID 1352 wrote to memory of 1160 1352 rundll32.exe 29 PID 1352 wrote to memory of 1160 1352 rundll32.exe 29 PID 1168 wrote to memory of 772 1168 rundll32Srv.exe 30 PID 1168 wrote to memory of 772 1168 rundll32Srv.exe 30 PID 1168 wrote to memory of 772 1168 rundll32Srv.exe 30 PID 1168 wrote to memory of 772 1168 rundll32Srv.exe 30 PID 772 wrote to memory of 584 772 WaterMark.exe 31 PID 772 wrote to memory of 584 772 WaterMark.exe 31 PID 772 wrote to memory of 584 772 WaterMark.exe 31 PID 772 wrote to memory of 584 772 WaterMark.exe 31 PID 772 wrote to memory of 584 772 WaterMark.exe 31 PID 772 wrote to memory of 584 772 WaterMark.exe 31 PID 772 wrote to memory of 584 772 WaterMark.exe 31 PID 772 wrote to memory of 584 772 WaterMark.exe 31 PID 772 wrote to memory of 584 772 WaterMark.exe 31 PID 772 wrote to memory of 584 772 WaterMark.exe 31 PID 772 wrote to memory of 988 772 WaterMark.exe 32 PID 772 wrote to memory of 988 772 WaterMark.exe 32 PID 772 wrote to memory of 988 772 WaterMark.exe 32 PID 772 wrote to memory of 988 772 WaterMark.exe 32 PID 772 wrote to memory of 988 772 WaterMark.exe 32 PID 772 wrote to memory of 988 772 WaterMark.exe 32 PID 772 wrote to memory of 988 772 WaterMark.exe 32 PID 772 wrote to memory of 988 772 WaterMark.exe 32 PID 772 wrote to memory of 988 772 WaterMark.exe 32 PID 772 wrote to memory of 988 772 WaterMark.exe 32 PID 988 wrote to memory of 260 988 svchost.exe 7 PID 988 wrote to memory of 260 988 svchost.exe 7 PID 988 wrote to memory of 260 988 svchost.exe 7 PID 988 wrote to memory of 260 988 svchost.exe 7 PID 988 wrote to memory of 260 988 svchost.exe 7 PID 988 wrote to memory of 332 988 svchost.exe 6 PID 988 wrote to memory of 332 988 svchost.exe 6 PID 988 wrote to memory of 332 988 svchost.exe 6 PID 988 wrote to memory of 332 988 svchost.exe 6 PID 988 wrote to memory of 332 988 svchost.exe 6 PID 988 wrote to memory of 368 988 svchost.exe 5 PID 988 wrote to memory of 368 988 svchost.exe 5 PID 988 wrote to memory of 368 988 svchost.exe 5 PID 988 wrote to memory of 368 988 svchost.exe 5 PID 988 wrote to memory of 368 988 svchost.exe 5 PID 988 wrote to memory of 380 988 svchost.exe 4 PID 988 wrote to memory of 380 988 svchost.exe 4 PID 988 wrote to memory of 380 988 svchost.exe 4 PID 988 wrote to memory of 380 988 svchost.exe 4 PID 988 wrote to memory of 380 988 svchost.exe 4 PID 988 wrote to memory of 416 988 svchost.exe 3 PID 988 wrote to memory of 416 988 svchost.exe 3 PID 988 wrote to memory of 416 988 svchost.exe 3 PID 988 wrote to memory of 416 988 svchost.exe 3 PID 988 wrote to memory of 416 988 svchost.exe 3
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:476
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵PID:460
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵PID:676
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵PID:888
-
\\?\C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R3⤵PID:1796
-
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵PID:1780
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵PID:752
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵PID:1124
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵PID:1084
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵PID:300
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵PID:324
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵PID:844
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵PID:816
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:760
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵PID:596
-
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:416
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:380
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:368
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:484
-
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:332
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe1⤵PID:260
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eac8023f7f98d02be864e0a0e04b98237caba618635ea8db98b20e79526c9ad.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eac8023f7f98d02be864e0a0e04b98237caba618635ea8db98b20e79526c9ad.dll,#13⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\SysWOW64\rundll32Srv.exeC:\Windows\SysWOW64\rundll32Srv.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe6⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:584
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:988
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1352 -s 2284⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:1160
-
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1176
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
94KB
MD5f6736faa3126f64ed4a7109e40c47806
SHA10d50917f44d6e173bac24916c95343616dcbf18c
SHA256bc0cb854888c155cbfed860a6546bea3c82db643df30437fe14d91194939a874
SHA51229cc26cd4df360252917a5d913e5e4776b6d05061b464f09dbb33918491affdc15cac9e142a9227a48f27d26db1f8ee85bd3d417365d6fef9b2fd380e090efe5
-
Filesize
94KB
MD5f6736faa3126f64ed4a7109e40c47806
SHA10d50917f44d6e173bac24916c95343616dcbf18c
SHA256bc0cb854888c155cbfed860a6546bea3c82db643df30437fe14d91194939a874
SHA51229cc26cd4df360252917a5d913e5e4776b6d05061b464f09dbb33918491affdc15cac9e142a9227a48f27d26db1f8ee85bd3d417365d6fef9b2fd380e090efe5
-
Filesize
94KB
MD5f6736faa3126f64ed4a7109e40c47806
SHA10d50917f44d6e173bac24916c95343616dcbf18c
SHA256bc0cb854888c155cbfed860a6546bea3c82db643df30437fe14d91194939a874
SHA51229cc26cd4df360252917a5d913e5e4776b6d05061b464f09dbb33918491affdc15cac9e142a9227a48f27d26db1f8ee85bd3d417365d6fef9b2fd380e090efe5
-
Filesize
94KB
MD5f6736faa3126f64ed4a7109e40c47806
SHA10d50917f44d6e173bac24916c95343616dcbf18c
SHA256bc0cb854888c155cbfed860a6546bea3c82db643df30437fe14d91194939a874
SHA51229cc26cd4df360252917a5d913e5e4776b6d05061b464f09dbb33918491affdc15cac9e142a9227a48f27d26db1f8ee85bd3d417365d6fef9b2fd380e090efe5
-
Filesize
94KB
MD5f6736faa3126f64ed4a7109e40c47806
SHA10d50917f44d6e173bac24916c95343616dcbf18c
SHA256bc0cb854888c155cbfed860a6546bea3c82db643df30437fe14d91194939a874
SHA51229cc26cd4df360252917a5d913e5e4776b6d05061b464f09dbb33918491affdc15cac9e142a9227a48f27d26db1f8ee85bd3d417365d6fef9b2fd380e090efe5
-
Filesize
94KB
MD5f6736faa3126f64ed4a7109e40c47806
SHA10d50917f44d6e173bac24916c95343616dcbf18c
SHA256bc0cb854888c155cbfed860a6546bea3c82db643df30437fe14d91194939a874
SHA51229cc26cd4df360252917a5d913e5e4776b6d05061b464f09dbb33918491affdc15cac9e142a9227a48f27d26db1f8ee85bd3d417365d6fef9b2fd380e090efe5
-
Filesize
94KB
MD5f6736faa3126f64ed4a7109e40c47806
SHA10d50917f44d6e173bac24916c95343616dcbf18c
SHA256bc0cb854888c155cbfed860a6546bea3c82db643df30437fe14d91194939a874
SHA51229cc26cd4df360252917a5d913e5e4776b6d05061b464f09dbb33918491affdc15cac9e142a9227a48f27d26db1f8ee85bd3d417365d6fef9b2fd380e090efe5
-
Filesize
94KB
MD5f6736faa3126f64ed4a7109e40c47806
SHA10d50917f44d6e173bac24916c95343616dcbf18c
SHA256bc0cb854888c155cbfed860a6546bea3c82db643df30437fe14d91194939a874
SHA51229cc26cd4df360252917a5d913e5e4776b6d05061b464f09dbb33918491affdc15cac9e142a9227a48f27d26db1f8ee85bd3d417365d6fef9b2fd380e090efe5