Analysis
-
max time kernel
74s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2022, 15:49
Static task
static1
Behavioral task
behavioral1
Sample
f27ee0e4bd1f002701ed8809cb05ff311e6e8379b0bfac8b058b78eaa990901a.exe
Resource
win7-20220812-en
General
-
Target
f27ee0e4bd1f002701ed8809cb05ff311e6e8379b0bfac8b058b78eaa990901a.exe
-
Size
115KB
-
MD5
04455490197eeaa89788d08e802edff1
-
SHA1
acee015279ffdff17f7be9221104cf13455df5eb
-
SHA256
f27ee0e4bd1f002701ed8809cb05ff311e6e8379b0bfac8b058b78eaa990901a
-
SHA512
fb6bc692ffc222eb7a4c1b4f4b009f0f771249cc9d9df73c02bede8419f63cc86f908571e63998dfa85721a600413496266b1c845866419a0e6f1159c2041a31
-
SSDEEP
3072:8T2xNfzEmPUac0yCRS9EK0TLmTFOi/dhF:8kPpe0mTn/b
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2024 WaterMark.exe -
resource yara_rule behavioral2/memory/4992-134-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4992-135-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4992-138-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/2024-146-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2024-147-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2024-148-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2024-151-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2024-152-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2024-153-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2024-154-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\pxCA88.tmp f27ee0e4bd1f002701ed8809cb05ff311e6e8379b0bfac8b058b78eaa990901a.exe File created C:\Program Files (x86)\Microsoft\WaterMark.exe f27ee0e4bd1f002701ed8809cb05ff311e6e8379b0bfac8b058b78eaa990901a.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe f27ee0e4bd1f002701ed8809cb05ff311e6e8379b0bfac8b058b78eaa990901a.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3060 3336 WerFault.exe 84 -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{7AA360BB-5F3F-11ED-A0EE-46E60354FB13} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30995276" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30995276" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1357029184" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1328747124" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1328903922" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30995276" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1357029184" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30995276" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1328747124" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30995276" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{7AA387CB-5F3F-11ED-A0EE-46E60354FB13} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30995276" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1328903922" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "374661152" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 2024 WaterMark.exe 2024 WaterMark.exe 2024 WaterMark.exe 2024 WaterMark.exe 2024 WaterMark.exe 2024 WaterMark.exe 2024 WaterMark.exe 2024 WaterMark.exe 2024 WaterMark.exe 2024 WaterMark.exe 2024 WaterMark.exe 2024 WaterMark.exe 2024 WaterMark.exe 2024 WaterMark.exe 2024 WaterMark.exe 2024 WaterMark.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2220 iexplore.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2024 WaterMark.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2220 iexplore.exe 2972 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2220 iexplore.exe 2220 iexplore.exe 2972 iexplore.exe 2972 iexplore.exe 236 IEXPLORE.EXE 236 IEXPLORE.EXE 232 IEXPLORE.EXE 232 IEXPLORE.EXE 236 IEXPLORE.EXE 236 IEXPLORE.EXE -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4992 f27ee0e4bd1f002701ed8809cb05ff311e6e8379b0bfac8b058b78eaa990901a.exe 2024 WaterMark.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 4992 wrote to memory of 2024 4992 f27ee0e4bd1f002701ed8809cb05ff311e6e8379b0bfac8b058b78eaa990901a.exe 83 PID 4992 wrote to memory of 2024 4992 f27ee0e4bd1f002701ed8809cb05ff311e6e8379b0bfac8b058b78eaa990901a.exe 83 PID 4992 wrote to memory of 2024 4992 f27ee0e4bd1f002701ed8809cb05ff311e6e8379b0bfac8b058b78eaa990901a.exe 83 PID 2024 wrote to memory of 3336 2024 WaterMark.exe 84 PID 2024 wrote to memory of 3336 2024 WaterMark.exe 84 PID 2024 wrote to memory of 3336 2024 WaterMark.exe 84 PID 2024 wrote to memory of 3336 2024 WaterMark.exe 84 PID 2024 wrote to memory of 3336 2024 WaterMark.exe 84 PID 2024 wrote to memory of 3336 2024 WaterMark.exe 84 PID 2024 wrote to memory of 3336 2024 WaterMark.exe 84 PID 2024 wrote to memory of 3336 2024 WaterMark.exe 84 PID 2024 wrote to memory of 3336 2024 WaterMark.exe 84 PID 2024 wrote to memory of 2972 2024 WaterMark.exe 88 PID 2024 wrote to memory of 2972 2024 WaterMark.exe 88 PID 2024 wrote to memory of 2220 2024 WaterMark.exe 89 PID 2024 wrote to memory of 2220 2024 WaterMark.exe 89 PID 2220 wrote to memory of 236 2220 iexplore.exe 90 PID 2220 wrote to memory of 236 2220 iexplore.exe 90 PID 2220 wrote to memory of 236 2220 iexplore.exe 90 PID 2972 wrote to memory of 232 2972 iexplore.exe 91 PID 2972 wrote to memory of 232 2972 iexplore.exe 91 PID 2972 wrote to memory of 232 2972 iexplore.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\f27ee0e4bd1f002701ed8809cb05ff311e6e8379b0bfac8b058b78eaa990901a.exe"C:\Users\Admin\AppData\Local\Temp\f27ee0e4bd1f002701ed8809cb05ff311e6e8379b0bfac8b058b78eaa990901a.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:3336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3336 -s 2084⤵
- Program crash
PID:3060
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2972 CREDAT:17410 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:232
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:17410 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:236
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3336 -ip 33361⤵PID:2264
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
115KB
MD504455490197eeaa89788d08e802edff1
SHA1acee015279ffdff17f7be9221104cf13455df5eb
SHA256f27ee0e4bd1f002701ed8809cb05ff311e6e8379b0bfac8b058b78eaa990901a
SHA512fb6bc692ffc222eb7a4c1b4f4b009f0f771249cc9d9df73c02bede8419f63cc86f908571e63998dfa85721a600413496266b1c845866419a0e6f1159c2041a31
-
Filesize
115KB
MD504455490197eeaa89788d08e802edff1
SHA1acee015279ffdff17f7be9221104cf13455df5eb
SHA256f27ee0e4bd1f002701ed8809cb05ff311e6e8379b0bfac8b058b78eaa990901a
SHA512fb6bc692ffc222eb7a4c1b4f4b009f0f771249cc9d9df73c02bede8419f63cc86f908571e63998dfa85721a600413496266b1c845866419a0e6f1159c2041a31
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{7AA360BB-5F3F-11ED-A0EE-46E60354FB13}.dat
Filesize3KB
MD50ecc06d8412cbadd27cc2de22cbca402
SHA111f4b1df0cad3cbf54f42eefe7338cc0665007f1
SHA256d86d2a50369169342d5b1a99cd346a85d49341021055ec35f4a5292d97e9ee5b
SHA512dbd56b8d1d5909d93c30fe02cc3f8700ff1ae9239e015fe0e64027a364196c757fc55efea0ba36200ad896d8a2b30934f2df8d54c21c0501f1f22a5b94c58e44
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{7AA387CB-5F3F-11ED-A0EE-46E60354FB13}.dat
Filesize5KB
MD56dd181522965ece972e70dc602c369fb
SHA1eb6a064d62e48c183ddc729ec09576e3836205eb
SHA256d66c7396e9950728aacd6b28b6eb3d1be8dd668d5573c9d3a6ecfe8f596a6c8e
SHA512fb62a8679441f1d87ce8c24a73efcb7c8632f342f170f394fbba282390e2e6628933de786e60277673a45a5de3103679e0ea964687118059a6995477b4c6b5cd