Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06/11/2022, 20:53
Static task
static1
Behavioral task
behavioral1
Sample
9a67ca9394f49740940434eb6aec56e8d95e46fcba069b7a31266adb1ce6ec13.dll
Resource
win7-20220812-en
General
-
Target
9a67ca9394f49740940434eb6aec56e8d95e46fcba069b7a31266adb1ce6ec13.dll
-
Size
408KB
-
MD5
046e1550e3b43207ce668c406161164d
-
SHA1
8b457ddda0da97f117a5ad55f76e8fa312e92e0c
-
SHA256
9a67ca9394f49740940434eb6aec56e8d95e46fcba069b7a31266adb1ce6ec13
-
SHA512
30c69ac88fd7baaa1ff7e6281b4960e01aef1de8d9915e607d0c03ec9bc5e2f038b7f9d115c50a02f4101202d0e9a14fbe3043038025476c31f79a67686608fa
-
SSDEEP
12288:Loz83OtIEzW+/m/AyF7bCrO/E0McMxwFB:YbIEzW+/m/rF7kcRNXr
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,c:\\program files (x86)\\microsoft\\watermark.exe" svchost.exe -
Executes dropped EXE 2 IoCs
pid Process 1780 rundll32mgr.exe 1252 WaterMark.exe -
resource yara_rule behavioral1/memory/1780-65-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1252-79-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1252-208-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Loads dropped DLL 4 IoCs
pid Process 1792 rundll32.exe 1792 rundll32.exe 1780 rundll32mgr.exe 1780 rundll32mgr.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe File created C:\Windows\SysWOW64\dmlconf.dat svchost.exe File opened for modification C:\Windows\SysWOW64\dmlconf.dat svchost.exe -
Drops file in Program Files directory 10 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\7-zip32.dll svchost.exe File opened for modification C:\Program Files\7-Zip\7z.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7zG.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7z.dll svchost.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\pxE734.tmp rundll32mgr.exe File created C:\Program Files (x86)\Microsoft\WaterMark.exe rundll32mgr.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe rundll32mgr.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7-zip.dll svchost.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1076 1792 WerFault.exe 28 -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 1252 WaterMark.exe 1252 WaterMark.exe 1252 WaterMark.exe 1252 WaterMark.exe 1252 WaterMark.exe 1252 WaterMark.exe 1252 WaterMark.exe 1252 WaterMark.exe 624 svchost.exe 624 svchost.exe 624 svchost.exe 624 svchost.exe 624 svchost.exe 624 svchost.exe 624 svchost.exe 624 svchost.exe 624 svchost.exe 624 svchost.exe 624 svchost.exe 624 svchost.exe 624 svchost.exe 624 svchost.exe 624 svchost.exe 624 svchost.exe 624 svchost.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1252 WaterMark.exe Token: SeDebugPrivilege 624 svchost.exe Token: SeDebugPrivilege 1792 rundll32.exe Token: SeDebugPrivilege 1076 WerFault.exe Token: SeDebugPrivilege 1252 WaterMark.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 864 wrote to memory of 1792 864 rundll32.exe 28 PID 864 wrote to memory of 1792 864 rundll32.exe 28 PID 864 wrote to memory of 1792 864 rundll32.exe 28 PID 864 wrote to memory of 1792 864 rundll32.exe 28 PID 864 wrote to memory of 1792 864 rundll32.exe 28 PID 864 wrote to memory of 1792 864 rundll32.exe 28 PID 864 wrote to memory of 1792 864 rundll32.exe 28 PID 1792 wrote to memory of 1780 1792 rundll32.exe 29 PID 1792 wrote to memory of 1780 1792 rundll32.exe 29 PID 1792 wrote to memory of 1780 1792 rundll32.exe 29 PID 1792 wrote to memory of 1780 1792 rundll32.exe 29 PID 1780 wrote to memory of 1252 1780 rundll32mgr.exe 31 PID 1780 wrote to memory of 1252 1780 rundll32mgr.exe 31 PID 1780 wrote to memory of 1252 1780 rundll32mgr.exe 31 PID 1780 wrote to memory of 1252 1780 rundll32mgr.exe 31 PID 1792 wrote to memory of 1076 1792 rundll32.exe 30 PID 1792 wrote to memory of 1076 1792 rundll32.exe 30 PID 1792 wrote to memory of 1076 1792 rundll32.exe 30 PID 1792 wrote to memory of 1076 1792 rundll32.exe 30 PID 1252 wrote to memory of 2040 1252 WaterMark.exe 32 PID 1252 wrote to memory of 2040 1252 WaterMark.exe 32 PID 1252 wrote to memory of 2040 1252 WaterMark.exe 32 PID 1252 wrote to memory of 2040 1252 WaterMark.exe 32 PID 1252 wrote to memory of 2040 1252 WaterMark.exe 32 PID 1252 wrote to memory of 2040 1252 WaterMark.exe 32 PID 1252 wrote to memory of 2040 1252 WaterMark.exe 32 PID 1252 wrote to memory of 2040 1252 WaterMark.exe 32 PID 1252 wrote to memory of 2040 1252 WaterMark.exe 32 PID 1252 wrote to memory of 2040 1252 WaterMark.exe 32 PID 1252 wrote to memory of 624 1252 WaterMark.exe 33 PID 1252 wrote to memory of 624 1252 WaterMark.exe 33 PID 1252 wrote to memory of 624 1252 WaterMark.exe 33 PID 1252 wrote to memory of 624 1252 WaterMark.exe 33 PID 1252 wrote to memory of 624 1252 WaterMark.exe 33 PID 1252 wrote to memory of 624 1252 WaterMark.exe 33 PID 1252 wrote to memory of 624 1252 WaterMark.exe 33 PID 1252 wrote to memory of 624 1252 WaterMark.exe 33 PID 1252 wrote to memory of 624 1252 WaterMark.exe 33 PID 1252 wrote to memory of 624 1252 WaterMark.exe 33 PID 624 wrote to memory of 260 624 svchost.exe 7 PID 624 wrote to memory of 260 624 svchost.exe 7 PID 624 wrote to memory of 260 624 svchost.exe 7 PID 624 wrote to memory of 260 624 svchost.exe 7 PID 624 wrote to memory of 260 624 svchost.exe 7 PID 624 wrote to memory of 332 624 svchost.exe 6 PID 624 wrote to memory of 332 624 svchost.exe 6 PID 624 wrote to memory of 332 624 svchost.exe 6 PID 624 wrote to memory of 332 624 svchost.exe 6 PID 624 wrote to memory of 332 624 svchost.exe 6 PID 624 wrote to memory of 368 624 svchost.exe 5 PID 624 wrote to memory of 368 624 svchost.exe 5 PID 624 wrote to memory of 368 624 svchost.exe 5 PID 624 wrote to memory of 368 624 svchost.exe 5 PID 624 wrote to memory of 368 624 svchost.exe 5 PID 624 wrote to memory of 384 624 svchost.exe 4 PID 624 wrote to memory of 384 624 svchost.exe 4 PID 624 wrote to memory of 384 624 svchost.exe 4 PID 624 wrote to memory of 384 624 svchost.exe 4 PID 624 wrote to memory of 384 624 svchost.exe 4 PID 624 wrote to memory of 420 624 svchost.exe 3 PID 624 wrote to memory of 420 624 svchost.exe 3 PID 624 wrote to memory of 420 624 svchost.exe 3 PID 624 wrote to memory of 420 624 svchost.exe 3 PID 624 wrote to memory of 420 624 svchost.exe 3
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:476
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵PID:468
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵PID:672
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵PID:592
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe3⤵PID:1764
-
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:756
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵PID:808
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"3⤵PID:1192
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵PID:840
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵PID:284
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵PID:888
-
\\?\C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R3⤵PID:1672
-
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵PID:328
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵PID:1044
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵PID:1124
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵PID:316
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵PID:1816
-
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:420
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:384
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:368
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:484
-
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:332
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe1⤵PID:260
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1236
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9a67ca9394f49740940434eb6aec56e8d95e46fcba069b7a31266adb1ce6ec13.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9a67ca9394f49740940434eb6aec56e8d95e46fcba069b7a31266adb1ce6ec13.dll,#13⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe6⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Drops file in Program Files directory
PID:2040
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:624
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1792 -s 2284⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:1076
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5849ef19ec0155d79d4fa5bfb5657b106
SHA1eb7e7ff208ecb40d35755d8f36e31e2482166299
SHA2568b853e963eab5aa857b640be1d07d605a8bf6dd8bdf8884505b05034bbd87e04
SHA51230384d9943f7eca4efbdcac52d3dd9c14446a2d75dc04ce4047feabe037c5177138f6bdcb055939dcc47608dfb50a54c9676f795d850c9a9de353f90252053a2
-
Filesize
65KB
MD5849ef19ec0155d79d4fa5bfb5657b106
SHA1eb7e7ff208ecb40d35755d8f36e31e2482166299
SHA2568b853e963eab5aa857b640be1d07d605a8bf6dd8bdf8884505b05034bbd87e04
SHA51230384d9943f7eca4efbdcac52d3dd9c14446a2d75dc04ce4047feabe037c5177138f6bdcb055939dcc47608dfb50a54c9676f795d850c9a9de353f90252053a2
-
Filesize
65KB
MD5849ef19ec0155d79d4fa5bfb5657b106
SHA1eb7e7ff208ecb40d35755d8f36e31e2482166299
SHA2568b853e963eab5aa857b640be1d07d605a8bf6dd8bdf8884505b05034bbd87e04
SHA51230384d9943f7eca4efbdcac52d3dd9c14446a2d75dc04ce4047feabe037c5177138f6bdcb055939dcc47608dfb50a54c9676f795d850c9a9de353f90252053a2
-
Filesize
65KB
MD5849ef19ec0155d79d4fa5bfb5657b106
SHA1eb7e7ff208ecb40d35755d8f36e31e2482166299
SHA2568b853e963eab5aa857b640be1d07d605a8bf6dd8bdf8884505b05034bbd87e04
SHA51230384d9943f7eca4efbdcac52d3dd9c14446a2d75dc04ce4047feabe037c5177138f6bdcb055939dcc47608dfb50a54c9676f795d850c9a9de353f90252053a2
-
Filesize
65KB
MD5849ef19ec0155d79d4fa5bfb5657b106
SHA1eb7e7ff208ecb40d35755d8f36e31e2482166299
SHA2568b853e963eab5aa857b640be1d07d605a8bf6dd8bdf8884505b05034bbd87e04
SHA51230384d9943f7eca4efbdcac52d3dd9c14446a2d75dc04ce4047feabe037c5177138f6bdcb055939dcc47608dfb50a54c9676f795d850c9a9de353f90252053a2
-
Filesize
65KB
MD5849ef19ec0155d79d4fa5bfb5657b106
SHA1eb7e7ff208ecb40d35755d8f36e31e2482166299
SHA2568b853e963eab5aa857b640be1d07d605a8bf6dd8bdf8884505b05034bbd87e04
SHA51230384d9943f7eca4efbdcac52d3dd9c14446a2d75dc04ce4047feabe037c5177138f6bdcb055939dcc47608dfb50a54c9676f795d850c9a9de353f90252053a2
-
Filesize
65KB
MD5849ef19ec0155d79d4fa5bfb5657b106
SHA1eb7e7ff208ecb40d35755d8f36e31e2482166299
SHA2568b853e963eab5aa857b640be1d07d605a8bf6dd8bdf8884505b05034bbd87e04
SHA51230384d9943f7eca4efbdcac52d3dd9c14446a2d75dc04ce4047feabe037c5177138f6bdcb055939dcc47608dfb50a54c9676f795d850c9a9de353f90252053a2
-
Filesize
65KB
MD5849ef19ec0155d79d4fa5bfb5657b106
SHA1eb7e7ff208ecb40d35755d8f36e31e2482166299
SHA2568b853e963eab5aa857b640be1d07d605a8bf6dd8bdf8884505b05034bbd87e04
SHA51230384d9943f7eca4efbdcac52d3dd9c14446a2d75dc04ce4047feabe037c5177138f6bdcb055939dcc47608dfb50a54c9676f795d850c9a9de353f90252053a2