Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2022, 16:14
Static task
static1
Behavioral task
behavioral1
Sample
19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe
Resource
win7-20220812-en
General
-
Target
19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe
-
Size
810KB
-
MD5
607fc24e7b4fa69bab6c1c53839a7c15
-
SHA1
534b8db73692f3a7266271eb26dfaa3e3d7f8c50
-
SHA256
19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e
-
SHA512
7e509c5f81166f6a9605375ff6ecf498a0b620f42f4d495e0683d86f5399296446a07ca37dd0f8a3cadac63e875b6a3a540f257143a031908ffcdb4ac6e1b906
-
SSDEEP
12288:gRm0OqZQDi02wPW6QIOd4/vqUfcfSpKUy7:K2Dd2g1a+3tfYSpW
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
http://klkjwre77638dfqwieuoi888.info/
Signatures
-
Modifies firewall policy service 2 TTPs 9 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" WaterMark.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" WaterMark.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" IEXPLORE.EXE Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" IEXPLORE.EXE Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" WaterMark.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" IEXPLORE.EXE Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" WaterMark.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" WaterMark.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" IEXPLORE.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" WaterMark.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" WaterMark.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" WaterMark.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" IEXPLORE.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" IEXPLORE.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" WaterMark.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" WaterMark.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" IEXPLORE.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" IEXPLORE.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" IEXPLORE.EXE -
Disables RegEdit via registry modification 3 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\system\DisableRegistryTools = "1" 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\system\DisableRegistryTools = "1" WaterMark.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\system\DisableRegistryTools = "1" IEXPLORE.EXE -
Disables Task Manager via registry modification
-
Executes dropped EXE 5 IoCs
pid Process 4692 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1emgr.exe 996 WaterMark.exe 4832 WaterMarkmgr.exe 3192 WaterMark.exe 5112 WaterMark.exe -
resource yara_rule behavioral2/memory/1608-136-0x0000000003710000-0x000000000473A000-memory.dmp upx behavioral2/memory/4692-141-0x0000000000400000-0x0000000000470000-memory.dmp upx behavioral2/memory/1608-143-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/1608-144-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/1608-137-0x0000000004B40000-0x0000000005BCE000-memory.dmp upx behavioral2/memory/1608-147-0x0000000003710000-0x000000000473A000-memory.dmp upx behavioral2/memory/1608-153-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4692-157-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4832-164-0x0000000000400000-0x0000000000470000-memory.dmp upx behavioral2/memory/4832-167-0x0000000000400000-0x0000000000470000-memory.dmp upx behavioral2/memory/1608-160-0x0000000004B40000-0x0000000005BCE000-memory.dmp upx behavioral2/memory/3192-174-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral2/memory/4832-178-0x0000000000400000-0x0000000000470000-memory.dmp upx behavioral2/memory/4832-183-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/3192-181-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral2/memory/996-175-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral2/memory/3192-170-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral2/memory/5112-185-0x0000000003300000-0x000000000432A000-memory.dmp upx behavioral2/memory/5112-186-0x0000000004730000-0x00000000057BE000-memory.dmp upx behavioral2/memory/996-196-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral2/memory/3192-195-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral2/memory/996-193-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral2/memory/5112-197-0x0000000004730000-0x00000000057BE000-memory.dmp upx behavioral2/memory/5112-198-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral2/memory/996-199-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral2/memory/5112-200-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral2/memory/5112-201-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral2/memory/5112-202-0x0000000003300000-0x000000000432A000-memory.dmp upx behavioral2/memory/5112-203-0x0000000000400000-0x00000000004D6000-memory.dmp upx behavioral2/memory/996-208-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/3192-209-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/5112-213-0x0000000004730000-0x00000000057BE000-memory.dmp upx behavioral2/memory/5112-214-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/5112-215-0x0000000003300000-0x000000000432A000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" WaterMark.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc WaterMark.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" WaterMark.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" WaterMark.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" WaterMark.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" WaterMark.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" WaterMark.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" WaterMark.exe -
Drops file in Program Files directory 21 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\pxB2DA.tmp 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1emgr.exe File created C:\Program Files (x86)\Microsoft\WaterMark.exe 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1emgr.exe File opened for modification C:\Program Files (x86)\Microsoft\pxB645.tmp WaterMarkmgr.exe File created C:\Program Files (x86)\Microsoft\WaterMarkmgr.exe WaterMark.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\OfficeC2RClient.exe IEXPLORE.EXE File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\MavInject32.exe IEXPLORE.EXE File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe File created C:\Program Files (x86)\Microsoft\WaterMark.exe WaterMarkmgr.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zFM.exe IEXPLORE.EXE File opened for modification C:\PROGRAM FILES\7-ZIP\7zG.exe IEXPLORE.EXE File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\appvcleaner.exe IEXPLORE.EXE File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\InspectorOfficeGadget.exe IEXPLORE.EXE File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\OfficeClickToRun.exe IEXPLORE.EXE File created C:\Program Files (x86)\Microsoft\WaterMarkmgr.exe WaterMark.exe File created C:\Program Files (x86)\Microsoft\WaterMarkmgr.exe WaterMark.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7z.exe IEXPLORE.EXE File opened for modification C:\PROGRAM FILES\7-ZIP\Uninstall.exe IEXPLORE.EXE File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\AppVShNotify.exe IEXPLORE.EXE File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\IntegratedOffice.exe IEXPLORE.EXE File opened for modification C:\Program Files (x86)\Microsoft\pxB1C1.tmp 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe File created C:\Program Files (x86)\Microsoft\WaterMark.exe 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM.INI 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3035412540" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "374663471" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30995281" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3036038177" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3069944609" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3035568854" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30995281" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3069944609" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3069944609" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30995281" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3035412540" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3035568854" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30995281" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3036038177" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30995281" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30995281" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30995281" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{E0321E07-5F44-11ED-A0EE-7ADCB3813C8F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe 996 WaterMark.exe 996 WaterMark.exe 3192 WaterMark.exe 3192 WaterMark.exe 3192 WaterMark.exe 3192 WaterMark.exe 996 WaterMark.exe 996 WaterMark.exe 5112 WaterMark.exe 5112 WaterMark.exe 5112 WaterMark.exe 5112 WaterMark.exe 5112 WaterMark.exe 5112 WaterMark.exe 5112 WaterMark.exe 5112 WaterMark.exe 996 WaterMark.exe 996 WaterMark.exe 996 WaterMark.exe 996 WaterMark.exe 996 WaterMark.exe 996 WaterMark.exe 996 WaterMark.exe 996 WaterMark.exe 3192 WaterMark.exe 3192 WaterMark.exe 3192 WaterMark.exe 3192 WaterMark.exe 3192 WaterMark.exe 3192 WaterMark.exe 3192 WaterMark.exe 3192 WaterMark.exe 3192 WaterMark.exe 3192 WaterMark.exe 3192 WaterMark.exe 3192 WaterMark.exe 996 WaterMark.exe 996 WaterMark.exe 996 WaterMark.exe 996 WaterMark.exe 5112 WaterMark.exe 5112 WaterMark.exe 5112 WaterMark.exe 5112 WaterMark.exe 5112 WaterMark.exe 5112 WaterMark.exe 5112 WaterMark.exe 5112 WaterMark.exe 5112 WaterMark.exe 5112 WaterMark.exe 5112 WaterMark.exe 5112 WaterMark.exe 5112 WaterMark.exe 5112 WaterMark.exe 5112 WaterMark.exe 5112 WaterMark.exe 4596 IEXPLORE.EXE 4596 IEXPLORE.EXE 4596 IEXPLORE.EXE 4596 IEXPLORE.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1920 iexplore.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Token: SeDebugPrivilege 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Token: SeDebugPrivilege 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Token: SeDebugPrivilege 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Token: SeDebugPrivilege 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Token: SeDebugPrivilege 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Token: SeDebugPrivilege 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Token: SeDebugPrivilege 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Token: SeDebugPrivilege 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Token: SeDebugPrivilege 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Token: SeDebugPrivilege 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Token: SeDebugPrivilege 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Token: SeDebugPrivilege 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Token: SeDebugPrivilege 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Token: SeDebugPrivilege 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Token: SeDebugPrivilege 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Token: SeDebugPrivilege 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Token: SeDebugPrivilege 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Token: SeDebugPrivilege 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Token: SeDebugPrivilege 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Token: SeDebugPrivilege 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Token: SeDebugPrivilege 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Token: SeDebugPrivilege 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Token: SeDebugPrivilege 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Token: SeDebugPrivilege 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Token: SeDebugPrivilege 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Token: SeDebugPrivilege 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Token: SeDebugPrivilege 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Token: SeDebugPrivilege 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Token: SeDebugPrivilege 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Token: SeDebugPrivilege 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Token: SeDebugPrivilege 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Token: SeDebugPrivilege 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Token: SeDebugPrivilege 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Token: SeDebugPrivilege 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Token: SeDebugPrivilege 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Token: SeDebugPrivilege 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Token: SeDebugPrivilege 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Token: SeDebugPrivilege 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Token: SeDebugPrivilege 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Token: SeDebugPrivilege 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Token: SeDebugPrivilege 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Token: SeDebugPrivilege 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Token: SeDebugPrivilege 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Token: SeDebugPrivilege 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Token: SeDebugPrivilege 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Token: SeDebugPrivilege 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Token: SeDebugPrivilege 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Token: SeDebugPrivilege 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Token: SeDebugPrivilege 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Token: SeDebugPrivilege 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Token: SeDebugPrivilege 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Token: SeDebugPrivilege 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Token: SeDebugPrivilege 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Token: SeDebugPrivilege 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Token: SeDebugPrivilege 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Token: SeDebugPrivilege 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Token: SeDebugPrivilege 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Token: SeDebugPrivilege 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Token: SeDebugPrivilege 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Token: SeDebugPrivilege 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Token: SeDebugPrivilege 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Token: SeDebugPrivilege 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Token: SeDebugPrivilege 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2780 iexplore.exe 1920 iexplore.exe 3176 iexplore.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 3176 iexplore.exe 3176 iexplore.exe 2780 iexplore.exe 2780 iexplore.exe 1920 iexplore.exe 1920 iexplore.exe 4640 IEXPLORE.EXE 4640 IEXPLORE.EXE 4596 IEXPLORE.EXE 4596 IEXPLORE.EXE 3100 IEXPLORE.EXE 3100 IEXPLORE.EXE 4596 IEXPLORE.EXE 4596 IEXPLORE.EXE -
Suspicious use of UnmapMainImage 6 IoCs
pid Process 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe 4692 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1emgr.exe 996 WaterMark.exe 4832 WaterMarkmgr.exe 3192 WaterMark.exe 5112 WaterMark.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1608 wrote to memory of 4692 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe 80 PID 1608 wrote to memory of 4692 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe 80 PID 1608 wrote to memory of 4692 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe 80 PID 1608 wrote to memory of 780 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe 13 PID 1608 wrote to memory of 784 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe 12 PID 1608 wrote to memory of 1016 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe 9 PID 1608 wrote to memory of 2392 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe 22 PID 1608 wrote to memory of 2436 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe 59 PID 1608 wrote to memory of 2740 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe 32 PID 1608 wrote to memory of 2736 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe 30 PID 1608 wrote to memory of 1996 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe 29 PID 1608 wrote to memory of 3268 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe 28 PID 1608 wrote to memory of 3356 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe 27 PID 1608 wrote to memory of 3424 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe 26 PID 1608 wrote to memory of 3516 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe 57 PID 1608 wrote to memory of 3808 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe 56 PID 1608 wrote to memory of 4760 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe 38 PID 1608 wrote to memory of 4692 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe 80 PID 1608 wrote to memory of 4692 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe 80 PID 1608 wrote to memory of 996 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe 81 PID 1608 wrote to memory of 996 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe 81 PID 1608 wrote to memory of 996 1608 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe 81 PID 996 wrote to memory of 4832 996 WaterMark.exe 87 PID 996 wrote to memory of 4832 996 WaterMark.exe 87 PID 996 wrote to memory of 4832 996 WaterMark.exe 87 PID 4692 wrote to memory of 3192 4692 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1emgr.exe 85 PID 4692 wrote to memory of 3192 4692 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1emgr.exe 85 PID 4692 wrote to memory of 3192 4692 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1emgr.exe 85 PID 4832 wrote to memory of 5112 4832 WaterMarkmgr.exe 84 PID 4832 wrote to memory of 5112 4832 WaterMarkmgr.exe 84 PID 4832 wrote to memory of 5112 4832 WaterMarkmgr.exe 84 PID 996 wrote to memory of 1652 996 WaterMark.exe 83 PID 996 wrote to memory of 1652 996 WaterMark.exe 83 PID 996 wrote to memory of 1652 996 WaterMark.exe 83 PID 3192 wrote to memory of 1764 3192 WaterMark.exe 82 PID 3192 wrote to memory of 1764 3192 WaterMark.exe 82 PID 3192 wrote to memory of 1764 3192 WaterMark.exe 82 PID 996 wrote to memory of 1652 996 WaterMark.exe 83 PID 996 wrote to memory of 1652 996 WaterMark.exe 83 PID 996 wrote to memory of 1652 996 WaterMark.exe 83 PID 996 wrote to memory of 1652 996 WaterMark.exe 83 PID 996 wrote to memory of 1652 996 WaterMark.exe 83 PID 996 wrote to memory of 1652 996 WaterMark.exe 83 PID 3192 wrote to memory of 1764 3192 WaterMark.exe 82 PID 3192 wrote to memory of 1764 3192 WaterMark.exe 82 PID 3192 wrote to memory of 1764 3192 WaterMark.exe 82 PID 3192 wrote to memory of 1764 3192 WaterMark.exe 82 PID 3192 wrote to memory of 1764 3192 WaterMark.exe 82 PID 3192 wrote to memory of 1764 3192 WaterMark.exe 82 PID 5112 wrote to memory of 780 5112 WaterMark.exe 13 PID 5112 wrote to memory of 784 5112 WaterMark.exe 12 PID 5112 wrote to memory of 1016 5112 WaterMark.exe 9 PID 5112 wrote to memory of 780 5112 WaterMark.exe 13 PID 5112 wrote to memory of 784 5112 WaterMark.exe 12 PID 5112 wrote to memory of 1016 5112 WaterMark.exe 9 PID 5112 wrote to memory of 2392 5112 WaterMark.exe 22 PID 5112 wrote to memory of 2392 5112 WaterMark.exe 22 PID 5112 wrote to memory of 2436 5112 WaterMark.exe 59 PID 5112 wrote to memory of 2436 5112 WaterMark.exe 59 PID 5112 wrote to memory of 2740 5112 WaterMark.exe 32 PID 5112 wrote to memory of 2740 5112 WaterMark.exe 32 PID 5112 wrote to memory of 2736 5112 WaterMark.exe 30 PID 5112 wrote to memory of 2736 5112 WaterMark.exe 30 PID 5112 wrote to memory of 1996 5112 WaterMark.exe 29 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" WaterMark.exe
Processes
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:1016
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:784
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:780
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2392
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3424
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3356
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3268
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:1996
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe"C:\Users\Admin\AppData\Local\Temp\19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Disables RegEdit via registry modification
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1608 -
C:\Users\Admin\AppData\Local\Temp\19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1emgr.exeC:\Users\Admin\AppData\Local\Temp\19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1emgr.exe3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3176 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3176 CREDAT:17410 /prefetch:26⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4640
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1920 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1920 CREDAT:17410 /prefetch:26⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4596
-
-
-
-
-
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe4⤵PID:1652
-
-
C:\Program Files (x86)\Microsoft\WaterMarkmgr.exe"C:\Program Files (x86)\Microsoft\WaterMarkmgr.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4832
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2780 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2780 CREDAT:17410 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3100
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2404
-
-
-
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2740
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4760
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3808
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:3516
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2436
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe1⤵PID:1764
-
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"1⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
- System policy modification
PID:5112 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:3440
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵
- Modifies Internet Explorer settings
PID:2160
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵
- Modifies Internet Explorer settings
PID:2284
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE"2⤵PID:2548
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE"2⤵PID:960
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.1MB
MD5135d0d993b22665af76ddd2cfc514d03
SHA19d2512797d60c893d209faf0864aaddd19bc4312
SHA256cb18c994c7a949dbbcf1f2028e9975eba26cbb1e7800b9f4b4a3f94a4e82be58
SHA5125fb0b651a1e0718a59e4015b390d597d0a7ee74eaed560359a632c8f0be9f05f7569b76f0474fdb0025323fe38bf159f0fedcc009975d970d66de175ed9da3b2
-
Filesize
810KB
MD5607fc24e7b4fa69bab6c1c53839a7c15
SHA1534b8db73692f3a7266271eb26dfaa3e3d7f8c50
SHA25619e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e
SHA5127e509c5f81166f6a9605375ff6ecf498a0b620f42f4d495e0683d86f5399296446a07ca37dd0f8a3cadac63e875b6a3a540f257143a031908ffcdb4ac6e1b906
-
Filesize
810KB
MD5607fc24e7b4fa69bab6c1c53839a7c15
SHA1534b8db73692f3a7266271eb26dfaa3e3d7f8c50
SHA25619e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e
SHA5127e509c5f81166f6a9605375ff6ecf498a0b620f42f4d495e0683d86f5399296446a07ca37dd0f8a3cadac63e875b6a3a540f257143a031908ffcdb4ac6e1b906
-
Filesize
810KB
MD5607fc24e7b4fa69bab6c1c53839a7c15
SHA1534b8db73692f3a7266271eb26dfaa3e3d7f8c50
SHA25619e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e
SHA5127e509c5f81166f6a9605375ff6ecf498a0b620f42f4d495e0683d86f5399296446a07ca37dd0f8a3cadac63e875b6a3a540f257143a031908ffcdb4ac6e1b906
-
Filesize
810KB
MD5607fc24e7b4fa69bab6c1c53839a7c15
SHA1534b8db73692f3a7266271eb26dfaa3e3d7f8c50
SHA25619e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1e
SHA5127e509c5f81166f6a9605375ff6ecf498a0b620f42f4d495e0683d86f5399296446a07ca37dd0f8a3cadac63e875b6a3a540f257143a031908ffcdb4ac6e1b906
-
Filesize
404KB
MD53a51be334f3cedd7185130cd60047496
SHA15572a04718cffb848ae660713415b8ab95b3ec5c
SHA2563e6d0b2887dad2ea3845139a31dfc8b8a2923c3f58ae8ba241d1498e1cc7747b
SHA512ed2dda92f22f1d972508ede37cf6b8cf719e1d53271c2af988fe700e53f4ca0feb7e39712135e1c128f63ebf08ee6a555f35b555243c233afc943a22c9fe5783
-
Filesize
404KB
MD53a51be334f3cedd7185130cd60047496
SHA15572a04718cffb848ae660713415b8ab95b3ec5c
SHA2563e6d0b2887dad2ea3845139a31dfc8b8a2923c3f58ae8ba241d1498e1cc7747b
SHA512ed2dda92f22f1d972508ede37cf6b8cf719e1d53271c2af988fe700e53f4ca0feb7e39712135e1c128f63ebf08ee6a555f35b555243c233afc943a22c9fe5783
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD55f49b65bdc1713b58ed97d0e9625a968
SHA184b74e55478c9abb163aa6629e3fd3b91bed4806
SHA256a681ab9abc281fd12a7bd06f56e36a21e8ee28b5294815c5e07b781e324a32f9
SHA5124b502288bef324db8ad33e63c7b6f242ef7954a6fbec3ed012530044c82fee3ad1158febe088bc0deea67ac35646a0a1bd6d961c0f67b11fee584e4f1abd753a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize434B
MD5d7bc9ab8744b751295260cd292f9df92
SHA195e161169e0c12f8a1c96c9c721c2de0fa630b82
SHA256e21d3c4090e8ef0331fba0f36b49e4f93b72f3d79583afb89d742131bffc3d12
SHA512832bdd3a86f855e9a1af5fb35cc86bf22726eb5ca38c70e3e0ab52711d91c56cdcddcbec008cb10a2307ca025629bea405d87c16b124e62f4a34d1f5c3cc0c71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize434B
MD5d7bc9ab8744b751295260cd292f9df92
SHA195e161169e0c12f8a1c96c9c721c2de0fa630b82
SHA256e21d3c4090e8ef0331fba0f36b49e4f93b72f3d79583afb89d742131bffc3d12
SHA512832bdd3a86f855e9a1af5fb35cc86bf22726eb5ca38c70e3e0ab52711d91c56cdcddcbec008cb10a2307ca025629bea405d87c16b124e62f4a34d1f5c3cc0c71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize434B
MD5d7bc9ab8744b751295260cd292f9df92
SHA195e161169e0c12f8a1c96c9c721c2de0fa630b82
SHA256e21d3c4090e8ef0331fba0f36b49e4f93b72f3d79583afb89d742131bffc3d12
SHA512832bdd3a86f855e9a1af5fb35cc86bf22726eb5ca38c70e3e0ab52711d91c56cdcddcbec008cb10a2307ca025629bea405d87c16b124e62f4a34d1f5c3cc0c71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize434B
MD5386f6c5ee42f3ebcc442f0b0de468b2b
SHA1b9362c43b07da3b168716d3f66857237ae1f66ed
SHA25698080afd98ca4d0ca618617a998160c3274e7516bfc06e54cf4991ce95dedabd
SHA5128d5a7cbc4f08111c1d29bc1d3c7f6b6fae1d7da7544e26cb2f02f4af2cb636e59cfbae12c08b8f4817a312e2f45e1c290e460272d923a8a803e938398a55982c
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{E02D5827-5F44-11ED-A0EE-7ADCB3813C8F}.dat
Filesize3KB
MD5fabff1e56065d6494da790e9bffdb3f5
SHA1309b0394d7c1561f80e8f8a5a74700324fd5d4bf
SHA2569fd502950739ef41b068dba680da60dd60a50cd3da8a560c94ed7484f5cc38c5
SHA512e1c5dfb2aa06b2e703b915344cabcbc863db975d722b7b086ed7e4102755a6c54d4cfac77589f79ea8c8a4add61c88e943c9de3a3eda90f4058631a562459d1a
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{E02D5827-5F44-11ED-A0EE-7ADCB3813C8F}.dat
Filesize5KB
MD55dd64efafffdb12763456e5847234e02
SHA1e3568584c3d62de7c6f182f414be20a7075bb039
SHA256a0f7389892333317b06442610e15f492c9e8596e72a0de42ad34109bd30040eb
SHA512c11f8350bad36920ef190cc0767a0415603ba11da8c77d362f588bb1ddd01cae7510b1fbafeb8fd1202a96a09e481c4decbe7999198f562e5bee17c94c9a61ea
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{E0321E07-5F44-11ED-A0EE-7ADCB3813C8F}.dat
Filesize5KB
MD55399945990d522bff7c3ccdd3b811b12
SHA1c9c7dbe0ae3cae1ef593119e586afe1a3c03eb0a
SHA2568a418e094319988b6ee924b5c4e8ece4275f29cff1333290f46b2f30dece1678
SHA5120a5d2c04153734a1f16543cb33b5a86eac6cbe0f7ebeccf4283dd3c68ce5f73c9d5715a794a71594206ba6b263497a4ab54df0d2d38370c8d0a6c57685ad41a0
-
C:\Users\Admin\AppData\Local\Temp\19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1emgr.exe
Filesize404KB
MD53a51be334f3cedd7185130cd60047496
SHA15572a04718cffb848ae660713415b8ab95b3ec5c
SHA2563e6d0b2887dad2ea3845139a31dfc8b8a2923c3f58ae8ba241d1498e1cc7747b
SHA512ed2dda92f22f1d972508ede37cf6b8cf719e1d53271c2af988fe700e53f4ca0feb7e39712135e1c128f63ebf08ee6a555f35b555243c233afc943a22c9fe5783
-
C:\Users\Admin\AppData\Local\Temp\19e5deba49e461a011decdf81cab1e4934cc792909be23cde93fdd3b151d4c1emgr.exe
Filesize404KB
MD53a51be334f3cedd7185130cd60047496
SHA15572a04718cffb848ae660713415b8ab95b3ec5c
SHA2563e6d0b2887dad2ea3845139a31dfc8b8a2923c3f58ae8ba241d1498e1cc7747b
SHA512ed2dda92f22f1d972508ede37cf6b8cf719e1d53271c2af988fe700e53f4ca0feb7e39712135e1c128f63ebf08ee6a555f35b555243c233afc943a22c9fe5783
-
Filesize
258B
MD5bc8ef324ba9e648b21cad520bb930ec1
SHA1b74fd11e133e05970d4afd8054d19eea70cd407b
SHA256bfaad3dce26fdb61269a11cf9b699faa3ccb12ac182f02d6880fc6a9c1f2c062
SHA512fbb1bdc34dadea90e71a328ef03b7cd9c15f772b01bdf8d021018f75cbd404f4962172edb816f9fd6bb8081a10d97ea433ba0897d8c150acd1a86e5578444281