Analysis
-
max time kernel
151s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30-10-2022 23:11
Static task
static1
Behavioral task
behavioral1
Sample
7636fcdd3f40e7407ed00e00f9ca3f329abba64eb461c38873a4610dae34f334.dll
Resource
win7-20220812-en
General
-
Target
7636fcdd3f40e7407ed00e00f9ca3f329abba64eb461c38873a4610dae34f334.dll
-
Size
240KB
-
MD5
a10b05144aa44c696ddd051e3bf9f180
-
SHA1
24a39bb841865cd4b597098fc9c7749309b6fe37
-
SHA256
7636fcdd3f40e7407ed00e00f9ca3f329abba64eb461c38873a4610dae34f334
-
SHA512
84e5a9f2ea47f989f036d397f27f148731e69191f6f9081096f1da5ad8bfc3698627ceacff68a6beda389aa3206b3192e3032a0413878b49597d1bdf414b3b68
-
SSDEEP
3072:Zn4cV8gf2u41Z5tKlwqudua6aRVoFktlmRoUhD:N4y8gOl25Edkkt2oUhD
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,c:\\program files (x86)\\microsoft\\watermark.exe" svchost.exe -
Executes dropped EXE 2 IoCs
pid Process 1296 rundll32mgr.exe 1532 WaterMark.exe -
resource yara_rule behavioral1/memory/1296-62-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1296-63-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1296-69-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1532-75-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral1/memory/1532-76-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral1/memory/1532-193-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Loads dropped DLL 4 IoCs
pid Process 1632 rundll32.exe 1632 rundll32.exe 1296 rundll32mgr.exe 1296 rundll32mgr.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\dmlconf.dat svchost.exe File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe File created C:\Windows\SysWOW64\dmlconf.dat svchost.exe -
Drops file in Program Files directory 8 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\7-zip32.dll svchost.exe File opened for modification C:\Program Files\7-Zip\7z.dll svchost.exe File opened for modification C:\Program Files\7-Zip\7z.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\pxE6F6.tmp rundll32mgr.exe File created C:\Program Files (x86)\Microsoft\WaterMark.exe rundll32mgr.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe rundll32mgr.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7-zip.dll svchost.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 1532 WaterMark.exe 1532 WaterMark.exe 1532 WaterMark.exe 1532 WaterMark.exe 1532 WaterMark.exe 1532 WaterMark.exe 1532 WaterMark.exe 1532 WaterMark.exe 1588 svchost.exe 1588 svchost.exe 1588 svchost.exe 1588 svchost.exe 1588 svchost.exe 1588 svchost.exe 1588 svchost.exe 1588 svchost.exe 1588 svchost.exe 1588 svchost.exe 1588 svchost.exe 1588 svchost.exe 1588 svchost.exe 1588 svchost.exe 1588 svchost.exe 1588 svchost.exe 1588 svchost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1532 WaterMark.exe Token: SeDebugPrivilege 1588 svchost.exe Token: SeDebugPrivilege 1532 WaterMark.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1296 rundll32mgr.exe 1532 WaterMark.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 912 wrote to memory of 1632 912 rundll32.exe 27 PID 912 wrote to memory of 1632 912 rundll32.exe 27 PID 912 wrote to memory of 1632 912 rundll32.exe 27 PID 912 wrote to memory of 1632 912 rundll32.exe 27 PID 912 wrote to memory of 1632 912 rundll32.exe 27 PID 912 wrote to memory of 1632 912 rundll32.exe 27 PID 912 wrote to memory of 1632 912 rundll32.exe 27 PID 1632 wrote to memory of 1296 1632 rundll32.exe 28 PID 1632 wrote to memory of 1296 1632 rundll32.exe 28 PID 1632 wrote to memory of 1296 1632 rundll32.exe 28 PID 1632 wrote to memory of 1296 1632 rundll32.exe 28 PID 1296 wrote to memory of 1532 1296 rundll32mgr.exe 29 PID 1296 wrote to memory of 1532 1296 rundll32mgr.exe 29 PID 1296 wrote to memory of 1532 1296 rundll32mgr.exe 29 PID 1296 wrote to memory of 1532 1296 rundll32mgr.exe 29 PID 1532 wrote to memory of 240 1532 WaterMark.exe 30 PID 1532 wrote to memory of 240 1532 WaterMark.exe 30 PID 1532 wrote to memory of 240 1532 WaterMark.exe 30 PID 1532 wrote to memory of 240 1532 WaterMark.exe 30 PID 1532 wrote to memory of 240 1532 WaterMark.exe 30 PID 1532 wrote to memory of 240 1532 WaterMark.exe 30 PID 1532 wrote to memory of 240 1532 WaterMark.exe 30 PID 1532 wrote to memory of 240 1532 WaterMark.exe 30 PID 1532 wrote to memory of 240 1532 WaterMark.exe 30 PID 1532 wrote to memory of 240 1532 WaterMark.exe 30 PID 1532 wrote to memory of 1588 1532 WaterMark.exe 31 PID 1532 wrote to memory of 1588 1532 WaterMark.exe 31 PID 1532 wrote to memory of 1588 1532 WaterMark.exe 31 PID 1532 wrote to memory of 1588 1532 WaterMark.exe 31 PID 1532 wrote to memory of 1588 1532 WaterMark.exe 31 PID 1532 wrote to memory of 1588 1532 WaterMark.exe 31 PID 1532 wrote to memory of 1588 1532 WaterMark.exe 31 PID 1532 wrote to memory of 1588 1532 WaterMark.exe 31 PID 1532 wrote to memory of 1588 1532 WaterMark.exe 31 PID 1532 wrote to memory of 1588 1532 WaterMark.exe 31 PID 1588 wrote to memory of 260 1588 svchost.exe 7 PID 1588 wrote to memory of 260 1588 svchost.exe 7 PID 1588 wrote to memory of 260 1588 svchost.exe 7 PID 1588 wrote to memory of 260 1588 svchost.exe 7 PID 1588 wrote to memory of 260 1588 svchost.exe 7 PID 1588 wrote to memory of 332 1588 svchost.exe 6 PID 1588 wrote to memory of 332 1588 svchost.exe 6 PID 1588 wrote to memory of 332 1588 svchost.exe 6 PID 1588 wrote to memory of 332 1588 svchost.exe 6 PID 1588 wrote to memory of 332 1588 svchost.exe 6 PID 1588 wrote to memory of 368 1588 svchost.exe 5 PID 1588 wrote to memory of 368 1588 svchost.exe 5 PID 1588 wrote to memory of 368 1588 svchost.exe 5 PID 1588 wrote to memory of 368 1588 svchost.exe 5 PID 1588 wrote to memory of 368 1588 svchost.exe 5 PID 1588 wrote to memory of 380 1588 svchost.exe 4 PID 1588 wrote to memory of 380 1588 svchost.exe 4 PID 1588 wrote to memory of 380 1588 svchost.exe 4 PID 1588 wrote to memory of 380 1588 svchost.exe 4 PID 1588 wrote to memory of 380 1588 svchost.exe 4 PID 1588 wrote to memory of 416 1588 svchost.exe 3 PID 1588 wrote to memory of 416 1588 svchost.exe 3 PID 1588 wrote to memory of 416 1588 svchost.exe 3 PID 1588 wrote to memory of 416 1588 svchost.exe 3 PID 1588 wrote to memory of 416 1588 svchost.exe 3 PID 1588 wrote to memory of 460 1588 svchost.exe 2 PID 1588 wrote to memory of 460 1588 svchost.exe 2 PID 1588 wrote to memory of 460 1588 svchost.exe 2 PID 1588 wrote to memory of 460 1588 svchost.exe 2
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:480
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵PID:460
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵PID:1620
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵PID:1184
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵PID:1240
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵PID:1044
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵PID:304
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵PID:336
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵PID:880
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵PID:848
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵PID:812
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:768
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵PID:680
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵PID:600
-
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:416
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:380
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:368
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:488
-
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:332
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe1⤵PID:260
-
\\?\C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R1⤵PID:2028
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1380
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7636fcdd3f40e7407ed00e00f9ca3f329abba64eb461c38873a4610dae34f334.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7636fcdd3f40e7407ed00e00f9ca3f329abba64eb461c38873a4610dae34f334.dll,#13⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe6⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Drops file in Program Files directory
PID:240
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1588
-
-
-
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1340
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148KB
MD56ef826e85bf6d60539fa8fea1207c60f
SHA1cd2ac10720d245997b3a9e9eaa8d527d06dec02a
SHA256671133f733c22443400b08440c43d474c3c2064754c31da51bf68929216a1bb9
SHA51225a931328f203f3387d0c72ef38de3ccbc30010c726d18e9fd605921e131b2c490135a593a77440ead7ec1bcfcb7f352920eaa79ebbd1ca7adb58141aa873fb9
-
Filesize
148KB
MD56ef826e85bf6d60539fa8fea1207c60f
SHA1cd2ac10720d245997b3a9e9eaa8d527d06dec02a
SHA256671133f733c22443400b08440c43d474c3c2064754c31da51bf68929216a1bb9
SHA51225a931328f203f3387d0c72ef38de3ccbc30010c726d18e9fd605921e131b2c490135a593a77440ead7ec1bcfcb7f352920eaa79ebbd1ca7adb58141aa873fb9
-
Filesize
148KB
MD56ef826e85bf6d60539fa8fea1207c60f
SHA1cd2ac10720d245997b3a9e9eaa8d527d06dec02a
SHA256671133f733c22443400b08440c43d474c3c2064754c31da51bf68929216a1bb9
SHA51225a931328f203f3387d0c72ef38de3ccbc30010c726d18e9fd605921e131b2c490135a593a77440ead7ec1bcfcb7f352920eaa79ebbd1ca7adb58141aa873fb9
-
Filesize
148KB
MD56ef826e85bf6d60539fa8fea1207c60f
SHA1cd2ac10720d245997b3a9e9eaa8d527d06dec02a
SHA256671133f733c22443400b08440c43d474c3c2064754c31da51bf68929216a1bb9
SHA51225a931328f203f3387d0c72ef38de3ccbc30010c726d18e9fd605921e131b2c490135a593a77440ead7ec1bcfcb7f352920eaa79ebbd1ca7adb58141aa873fb9
-
Filesize
148KB
MD56ef826e85bf6d60539fa8fea1207c60f
SHA1cd2ac10720d245997b3a9e9eaa8d527d06dec02a
SHA256671133f733c22443400b08440c43d474c3c2064754c31da51bf68929216a1bb9
SHA51225a931328f203f3387d0c72ef38de3ccbc30010c726d18e9fd605921e131b2c490135a593a77440ead7ec1bcfcb7f352920eaa79ebbd1ca7adb58141aa873fb9
-
Filesize
148KB
MD56ef826e85bf6d60539fa8fea1207c60f
SHA1cd2ac10720d245997b3a9e9eaa8d527d06dec02a
SHA256671133f733c22443400b08440c43d474c3c2064754c31da51bf68929216a1bb9
SHA51225a931328f203f3387d0c72ef38de3ccbc30010c726d18e9fd605921e131b2c490135a593a77440ead7ec1bcfcb7f352920eaa79ebbd1ca7adb58141aa873fb9
-
Filesize
148KB
MD56ef826e85bf6d60539fa8fea1207c60f
SHA1cd2ac10720d245997b3a9e9eaa8d527d06dec02a
SHA256671133f733c22443400b08440c43d474c3c2064754c31da51bf68929216a1bb9
SHA51225a931328f203f3387d0c72ef38de3ccbc30010c726d18e9fd605921e131b2c490135a593a77440ead7ec1bcfcb7f352920eaa79ebbd1ca7adb58141aa873fb9
-
Filesize
148KB
MD56ef826e85bf6d60539fa8fea1207c60f
SHA1cd2ac10720d245997b3a9e9eaa8d527d06dec02a
SHA256671133f733c22443400b08440c43d474c3c2064754c31da51bf68929216a1bb9
SHA51225a931328f203f3387d0c72ef38de3ccbc30010c726d18e9fd605921e131b2c490135a593a77440ead7ec1bcfcb7f352920eaa79ebbd1ca7adb58141aa873fb9