Analysis
-
max time kernel
152s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 23:15
Static task
static1
Behavioral task
behavioral1
Sample
3e6b944c23f16c2f1f03fe359161d84a76ef2b67d261fc86020264ebfbaee3a1.dll
Resource
win7-20220901-en
General
-
Target
3e6b944c23f16c2f1f03fe359161d84a76ef2b67d261fc86020264ebfbaee3a1.dll
-
Size
833KB
-
MD5
a0ec4edac97de4bcb3f71870e077bfa0
-
SHA1
9bb9c0e724ecfd99236fd94e503a5fc86619521e
-
SHA256
3e6b944c23f16c2f1f03fe359161d84a76ef2b67d261fc86020264ebfbaee3a1
-
SHA512
8fed05ecfe244e63607ae2c51a51448ac5bb1ce50c61867b985a8860edb05cb74071358e72507890464c99b6f815865b7e63b92d5666fb49065ade9cc98a23d4
-
SSDEEP
24576:Ezb1MlCKUQyUmjtczu6Prs9pgWoopooK9kwPkNhr:EzbKsUmjtcdPGgIwPkNhr
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,c:\\program files (x86)\\microsoft\\watermark.exe" svchost.exe -
Executes dropped EXE 2 IoCs
pid Process 984 rundll32mgr.exe 768 WaterMark.exe -
resource yara_rule behavioral1/memory/984-63-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/984-62-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/984-70-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/768-76-0x0000000000400000-0x000000000043F000-memory.dmp upx behavioral1/memory/768-88-0x0000000000400000-0x000000000043F000-memory.dmp upx behavioral1/memory/768-204-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Loads dropped DLL 4 IoCs
pid Process 1388 rundll32.exe 1388 rundll32.exe 984 rundll32mgr.exe 984 rundll32mgr.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe File created C:\Windows\SysWOW64\dmlconf.dat svchost.exe File opened for modification C:\Windows\SysWOW64\dmlconf.dat svchost.exe -
Drops file in Program Files directory 10 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe rundll32mgr.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7-zip.dll svchost.exe File opened for modification C:\Program Files\7-Zip\7z.dll svchost.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\px194C.tmp rundll32mgr.exe File created C:\Program Files (x86)\Microsoft\WaterMark.exe rundll32mgr.exe File opened for modification C:\Program Files\7-Zip\7zG.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7-zip32.dll svchost.exe File opened for modification C:\Program Files\7-Zip\7z.exe svchost.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 768 WaterMark.exe 768 WaterMark.exe 768 WaterMark.exe 768 WaterMark.exe 768 WaterMark.exe 768 WaterMark.exe 768 WaterMark.exe 768 WaterMark.exe 2040 svchost.exe 2040 svchost.exe 2040 svchost.exe 2040 svchost.exe 2040 svchost.exe 2040 svchost.exe 2040 svchost.exe 2040 svchost.exe 2040 svchost.exe 2040 svchost.exe 2040 svchost.exe 2040 svchost.exe 2040 svchost.exe 2040 svchost.exe 2040 svchost.exe 2040 svchost.exe 2040 svchost.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 768 WaterMark.exe Token: SeDebugPrivilege 2040 svchost.exe Token: SeDebugPrivilege 1388 rundll32.exe Token: SeDebugPrivilege 768 WaterMark.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 984 rundll32mgr.exe 768 WaterMark.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2028 wrote to memory of 1388 2028 rundll32.exe 27 PID 2028 wrote to memory of 1388 2028 rundll32.exe 27 PID 2028 wrote to memory of 1388 2028 rundll32.exe 27 PID 2028 wrote to memory of 1388 2028 rundll32.exe 27 PID 2028 wrote to memory of 1388 2028 rundll32.exe 27 PID 2028 wrote to memory of 1388 2028 rundll32.exe 27 PID 2028 wrote to memory of 1388 2028 rundll32.exe 27 PID 1388 wrote to memory of 984 1388 rundll32.exe 28 PID 1388 wrote to memory of 984 1388 rundll32.exe 28 PID 1388 wrote to memory of 984 1388 rundll32.exe 28 PID 1388 wrote to memory of 984 1388 rundll32.exe 28 PID 984 wrote to memory of 768 984 rundll32mgr.exe 29 PID 984 wrote to memory of 768 984 rundll32mgr.exe 29 PID 984 wrote to memory of 768 984 rundll32mgr.exe 29 PID 984 wrote to memory of 768 984 rundll32mgr.exe 29 PID 768 wrote to memory of 520 768 WaterMark.exe 30 PID 768 wrote to memory of 520 768 WaterMark.exe 30 PID 768 wrote to memory of 520 768 WaterMark.exe 30 PID 768 wrote to memory of 520 768 WaterMark.exe 30 PID 768 wrote to memory of 520 768 WaterMark.exe 30 PID 768 wrote to memory of 520 768 WaterMark.exe 30 PID 768 wrote to memory of 520 768 WaterMark.exe 30 PID 768 wrote to memory of 520 768 WaterMark.exe 30 PID 768 wrote to memory of 520 768 WaterMark.exe 30 PID 768 wrote to memory of 520 768 WaterMark.exe 30 PID 768 wrote to memory of 2040 768 WaterMark.exe 31 PID 768 wrote to memory of 2040 768 WaterMark.exe 31 PID 768 wrote to memory of 2040 768 WaterMark.exe 31 PID 768 wrote to memory of 2040 768 WaterMark.exe 31 PID 768 wrote to memory of 2040 768 WaterMark.exe 31 PID 768 wrote to memory of 2040 768 WaterMark.exe 31 PID 768 wrote to memory of 2040 768 WaterMark.exe 31 PID 768 wrote to memory of 2040 768 WaterMark.exe 31 PID 768 wrote to memory of 2040 768 WaterMark.exe 31 PID 768 wrote to memory of 2040 768 WaterMark.exe 31 PID 2040 wrote to memory of 260 2040 svchost.exe 7 PID 2040 wrote to memory of 260 2040 svchost.exe 7 PID 2040 wrote to memory of 260 2040 svchost.exe 7 PID 2040 wrote to memory of 260 2040 svchost.exe 7 PID 2040 wrote to memory of 260 2040 svchost.exe 7 PID 2040 wrote to memory of 332 2040 svchost.exe 6 PID 2040 wrote to memory of 332 2040 svchost.exe 6 PID 2040 wrote to memory of 332 2040 svchost.exe 6 PID 2040 wrote to memory of 332 2040 svchost.exe 6 PID 2040 wrote to memory of 332 2040 svchost.exe 6 PID 2040 wrote to memory of 368 2040 svchost.exe 5 PID 2040 wrote to memory of 368 2040 svchost.exe 5 PID 2040 wrote to memory of 368 2040 svchost.exe 5 PID 2040 wrote to memory of 368 2040 svchost.exe 5 PID 2040 wrote to memory of 368 2040 svchost.exe 5 PID 2040 wrote to memory of 380 2040 svchost.exe 4 PID 2040 wrote to memory of 380 2040 svchost.exe 4 PID 2040 wrote to memory of 380 2040 svchost.exe 4 PID 2040 wrote to memory of 380 2040 svchost.exe 4 PID 2040 wrote to memory of 380 2040 svchost.exe 4 PID 2040 wrote to memory of 416 2040 svchost.exe 3 PID 2040 wrote to memory of 416 2040 svchost.exe 3 PID 2040 wrote to memory of 416 2040 svchost.exe 3 PID 2040 wrote to memory of 416 2040 svchost.exe 3 PID 2040 wrote to memory of 416 2040 svchost.exe 3 PID 2040 wrote to memory of 460 2040 svchost.exe 2 PID 2040 wrote to memory of 460 2040 svchost.exe 2 PID 2040 wrote to memory of 460 2040 svchost.exe 2 PID 2040 wrote to memory of 460 2040 svchost.exe 2
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:476
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵PID:460
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵PID:868
-
\\?\C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R3⤵PID:1604
-
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵PID:1264
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵PID:1752
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵PID:1676
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵PID:1028
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵PID:284
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵PID:300
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵PID:844
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵PID:800
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:756
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵PID:672
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵PID:592
-
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:416
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:380
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:368
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:484
-
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:332
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe1⤵PID:260
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1400
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3e6b944c23f16c2f1f03fe359161d84a76ef2b67d261fc86020264ebfbaee3a1.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3e6b944c23f16c2f1f03fe359161d84a76ef2b67d261fc86020264ebfbaee3a1.dll,#13⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:984 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe6⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Drops file in Program Files directory
PID:520
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2040
-
-
-
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1340
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
174KB
MD55215690ed8422d1f80902345d7646074
SHA17cdb270c9fecb2cbdaa7d130303bdb9cd03ff010
SHA2562d95fb76a96547eccc00b0c3c025f0ed922c5c1a1611acb9a859e331a2117074
SHA512914e88e16b1524c979c7cdfbd170b11928eeb473d347ddf77fd3c97182c954cfa21b359e6c9e15057f98f47bf72b0e7b5f1c9e52c3573d73df814c29fc288fac
-
Filesize
174KB
MD55215690ed8422d1f80902345d7646074
SHA17cdb270c9fecb2cbdaa7d130303bdb9cd03ff010
SHA2562d95fb76a96547eccc00b0c3c025f0ed922c5c1a1611acb9a859e331a2117074
SHA512914e88e16b1524c979c7cdfbd170b11928eeb473d347ddf77fd3c97182c954cfa21b359e6c9e15057f98f47bf72b0e7b5f1c9e52c3573d73df814c29fc288fac
-
Filesize
174KB
MD55215690ed8422d1f80902345d7646074
SHA17cdb270c9fecb2cbdaa7d130303bdb9cd03ff010
SHA2562d95fb76a96547eccc00b0c3c025f0ed922c5c1a1611acb9a859e331a2117074
SHA512914e88e16b1524c979c7cdfbd170b11928eeb473d347ddf77fd3c97182c954cfa21b359e6c9e15057f98f47bf72b0e7b5f1c9e52c3573d73df814c29fc288fac
-
Filesize
174KB
MD55215690ed8422d1f80902345d7646074
SHA17cdb270c9fecb2cbdaa7d130303bdb9cd03ff010
SHA2562d95fb76a96547eccc00b0c3c025f0ed922c5c1a1611acb9a859e331a2117074
SHA512914e88e16b1524c979c7cdfbd170b11928eeb473d347ddf77fd3c97182c954cfa21b359e6c9e15057f98f47bf72b0e7b5f1c9e52c3573d73df814c29fc288fac
-
Filesize
174KB
MD55215690ed8422d1f80902345d7646074
SHA17cdb270c9fecb2cbdaa7d130303bdb9cd03ff010
SHA2562d95fb76a96547eccc00b0c3c025f0ed922c5c1a1611acb9a859e331a2117074
SHA512914e88e16b1524c979c7cdfbd170b11928eeb473d347ddf77fd3c97182c954cfa21b359e6c9e15057f98f47bf72b0e7b5f1c9e52c3573d73df814c29fc288fac
-
Filesize
174KB
MD55215690ed8422d1f80902345d7646074
SHA17cdb270c9fecb2cbdaa7d130303bdb9cd03ff010
SHA2562d95fb76a96547eccc00b0c3c025f0ed922c5c1a1611acb9a859e331a2117074
SHA512914e88e16b1524c979c7cdfbd170b11928eeb473d347ddf77fd3c97182c954cfa21b359e6c9e15057f98f47bf72b0e7b5f1c9e52c3573d73df814c29fc288fac
-
Filesize
174KB
MD55215690ed8422d1f80902345d7646074
SHA17cdb270c9fecb2cbdaa7d130303bdb9cd03ff010
SHA2562d95fb76a96547eccc00b0c3c025f0ed922c5c1a1611acb9a859e331a2117074
SHA512914e88e16b1524c979c7cdfbd170b11928eeb473d347ddf77fd3c97182c954cfa21b359e6c9e15057f98f47bf72b0e7b5f1c9e52c3573d73df814c29fc288fac
-
Filesize
174KB
MD55215690ed8422d1f80902345d7646074
SHA17cdb270c9fecb2cbdaa7d130303bdb9cd03ff010
SHA2562d95fb76a96547eccc00b0c3c025f0ed922c5c1a1611acb9a859e331a2117074
SHA512914e88e16b1524c979c7cdfbd170b11928eeb473d347ddf77fd3c97182c954cfa21b359e6c9e15057f98f47bf72b0e7b5f1c9e52c3573d73df814c29fc288fac