Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 17:07
Static task
static1
Behavioral task
behavioral1
Sample
76870fd9910067e9938152dd5071d70346466f62228f0458122f55918dbe0726.dll
Resource
win7-20220901-en
General
-
Target
76870fd9910067e9938152dd5071d70346466f62228f0458122f55918dbe0726.dll
-
Size
216KB
-
MD5
0e35d3cef9a0eb713973219c47e64ac1
-
SHA1
1c88f8a4513420659d3df10db6eb0369235f8ce3
-
SHA256
76870fd9910067e9938152dd5071d70346466f62228f0458122f55918dbe0726
-
SHA512
c8c124645563ad1c641b8a0808bce5c2ab55773ccc5e30e81aa20f2d6e6db5a7bd2f385ab16d043a6ad92807bafd841b369e7f0644a6d0638b7131622b556296
-
SSDEEP
3072:un4cV8gf2u41Z5tKlwF+yooPdW3WGaJxK:84y8gOl2aq3dqs
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,c:\\program files (x86)\\microsoft\\watermark.exe" svchost.exe -
Executes dropped EXE 2 IoCs
pid Process 1624 rundll32mgr.exe 584 WaterMark.exe -
resource yara_rule behavioral1/memory/1624-63-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1624-64-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1624-70-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/584-86-0x0000000000400000-0x000000000044A000-memory.dmp upx behavioral1/memory/584-87-0x0000000000400000-0x000000000044A000-memory.dmp upx behavioral1/memory/584-195-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Loads dropped DLL 4 IoCs
pid Process 1516 rundll32.exe 1516 rundll32.exe 1624 rundll32mgr.exe 1624 rundll32mgr.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\dmlconf.dat svchost.exe File opened for modification C:\Windows\SysWOW64\dmlconf.dat svchost.exe File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
Drops file in Program Files directory 10 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\7z.dll svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\px1AE1.tmp rundll32mgr.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe rundll32mgr.exe File opened for modification C:\Program Files\7-Zip\7-zip.dll svchost.exe File opened for modification C:\Program Files\7-Zip\7z.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7zG.exe svchost.exe File created C:\Program Files (x86)\Microsoft\WaterMark.exe rundll32mgr.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7-zip32.dll svchost.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 584 WaterMark.exe 584 WaterMark.exe 584 WaterMark.exe 584 WaterMark.exe 584 WaterMark.exe 584 WaterMark.exe 584 WaterMark.exe 584 WaterMark.exe 872 svchost.exe 872 svchost.exe 872 svchost.exe 872 svchost.exe 872 svchost.exe 872 svchost.exe 872 svchost.exe 872 svchost.exe 872 svchost.exe 872 svchost.exe 872 svchost.exe 872 svchost.exe 872 svchost.exe 872 svchost.exe 872 svchost.exe 872 svchost.exe 872 svchost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 584 WaterMark.exe Token: SeDebugPrivilege 872 svchost.exe Token: SeDebugPrivilege 584 WaterMark.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1624 rundll32mgr.exe 584 WaterMark.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1708 wrote to memory of 1516 1708 rundll32.exe 27 PID 1708 wrote to memory of 1516 1708 rundll32.exe 27 PID 1708 wrote to memory of 1516 1708 rundll32.exe 27 PID 1708 wrote to memory of 1516 1708 rundll32.exe 27 PID 1708 wrote to memory of 1516 1708 rundll32.exe 27 PID 1708 wrote to memory of 1516 1708 rundll32.exe 27 PID 1708 wrote to memory of 1516 1708 rundll32.exe 27 PID 1516 wrote to memory of 1624 1516 rundll32.exe 28 PID 1516 wrote to memory of 1624 1516 rundll32.exe 28 PID 1516 wrote to memory of 1624 1516 rundll32.exe 28 PID 1516 wrote to memory of 1624 1516 rundll32.exe 28 PID 1624 wrote to memory of 584 1624 rundll32mgr.exe 29 PID 1624 wrote to memory of 584 1624 rundll32mgr.exe 29 PID 1624 wrote to memory of 584 1624 rundll32mgr.exe 29 PID 1624 wrote to memory of 584 1624 rundll32mgr.exe 29 PID 584 wrote to memory of 1820 584 WaterMark.exe 30 PID 584 wrote to memory of 1820 584 WaterMark.exe 30 PID 584 wrote to memory of 1820 584 WaterMark.exe 30 PID 584 wrote to memory of 1820 584 WaterMark.exe 30 PID 584 wrote to memory of 1820 584 WaterMark.exe 30 PID 584 wrote to memory of 1820 584 WaterMark.exe 30 PID 584 wrote to memory of 1820 584 WaterMark.exe 30 PID 584 wrote to memory of 1820 584 WaterMark.exe 30 PID 584 wrote to memory of 1820 584 WaterMark.exe 30 PID 584 wrote to memory of 1820 584 WaterMark.exe 30 PID 584 wrote to memory of 872 584 WaterMark.exe 31 PID 584 wrote to memory of 872 584 WaterMark.exe 31 PID 584 wrote to memory of 872 584 WaterMark.exe 31 PID 584 wrote to memory of 872 584 WaterMark.exe 31 PID 584 wrote to memory of 872 584 WaterMark.exe 31 PID 584 wrote to memory of 872 584 WaterMark.exe 31 PID 584 wrote to memory of 872 584 WaterMark.exe 31 PID 584 wrote to memory of 872 584 WaterMark.exe 31 PID 584 wrote to memory of 872 584 WaterMark.exe 31 PID 584 wrote to memory of 872 584 WaterMark.exe 31 PID 872 wrote to memory of 260 872 svchost.exe 7 PID 872 wrote to memory of 260 872 svchost.exe 7 PID 872 wrote to memory of 260 872 svchost.exe 7 PID 872 wrote to memory of 260 872 svchost.exe 7 PID 872 wrote to memory of 260 872 svchost.exe 7 PID 872 wrote to memory of 332 872 svchost.exe 6 PID 872 wrote to memory of 332 872 svchost.exe 6 PID 872 wrote to memory of 332 872 svchost.exe 6 PID 872 wrote to memory of 332 872 svchost.exe 6 PID 872 wrote to memory of 332 872 svchost.exe 6 PID 872 wrote to memory of 368 872 svchost.exe 5 PID 872 wrote to memory of 368 872 svchost.exe 5 PID 872 wrote to memory of 368 872 svchost.exe 5 PID 872 wrote to memory of 368 872 svchost.exe 5 PID 872 wrote to memory of 368 872 svchost.exe 5 PID 872 wrote to memory of 380 872 svchost.exe 4 PID 872 wrote to memory of 380 872 svchost.exe 4 PID 872 wrote to memory of 380 872 svchost.exe 4 PID 872 wrote to memory of 380 872 svchost.exe 4 PID 872 wrote to memory of 380 872 svchost.exe 4 PID 872 wrote to memory of 416 872 svchost.exe 3 PID 872 wrote to memory of 416 872 svchost.exe 3 PID 872 wrote to memory of 416 872 svchost.exe 3 PID 872 wrote to memory of 416 872 svchost.exe 3 PID 872 wrote to memory of 416 872 svchost.exe 3 PID 872 wrote to memory of 464 872 svchost.exe 2 PID 872 wrote to memory of 464 872 svchost.exe 2 PID 872 wrote to memory of 464 872 svchost.exe 2 PID 872 wrote to memory of 464 872 svchost.exe 2
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:472
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵PID:464
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵PID:1080
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵PID:1756
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵PID:1640
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵PID:1116
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵PID:932
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵PID:328
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵PID:884
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵PID:844
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵PID:808
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:756
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵PID:672
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵PID:592
-
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:416
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:380
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:368
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:480
-
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:332
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe1⤵PID:260
-
\\?\C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R1⤵PID:1132
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1236
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\76870fd9910067e9938152dd5071d70346466f62228f0458122f55918dbe0726.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\76870fd9910067e9938152dd5071d70346466f62228f0458122f55918dbe0726.dll,#13⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe6⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Drops file in Program Files directory
PID:1820
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:872
-
-
-
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1180
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
123KB
MD541cdf1d40aff3f71114ea210307b6a1c
SHA18d5237ed7a29003af5b857edd85f7f54a91f600c
SHA25600ba79fa51af9b735ebbded72313232d83956c922e206362f9b71411772162b7
SHA512fdcba01191a345416f17fb4024255f97af135824f1ce57bb8456d74fbfd0e37f89500aeb92c19c4add62e6cb416c57cd06b2aee310fabb91e468852ca062ff0e
-
Filesize
123KB
MD541cdf1d40aff3f71114ea210307b6a1c
SHA18d5237ed7a29003af5b857edd85f7f54a91f600c
SHA25600ba79fa51af9b735ebbded72313232d83956c922e206362f9b71411772162b7
SHA512fdcba01191a345416f17fb4024255f97af135824f1ce57bb8456d74fbfd0e37f89500aeb92c19c4add62e6cb416c57cd06b2aee310fabb91e468852ca062ff0e
-
Filesize
123KB
MD541cdf1d40aff3f71114ea210307b6a1c
SHA18d5237ed7a29003af5b857edd85f7f54a91f600c
SHA25600ba79fa51af9b735ebbded72313232d83956c922e206362f9b71411772162b7
SHA512fdcba01191a345416f17fb4024255f97af135824f1ce57bb8456d74fbfd0e37f89500aeb92c19c4add62e6cb416c57cd06b2aee310fabb91e468852ca062ff0e
-
Filesize
123KB
MD541cdf1d40aff3f71114ea210307b6a1c
SHA18d5237ed7a29003af5b857edd85f7f54a91f600c
SHA25600ba79fa51af9b735ebbded72313232d83956c922e206362f9b71411772162b7
SHA512fdcba01191a345416f17fb4024255f97af135824f1ce57bb8456d74fbfd0e37f89500aeb92c19c4add62e6cb416c57cd06b2aee310fabb91e468852ca062ff0e
-
Filesize
123KB
MD541cdf1d40aff3f71114ea210307b6a1c
SHA18d5237ed7a29003af5b857edd85f7f54a91f600c
SHA25600ba79fa51af9b735ebbded72313232d83956c922e206362f9b71411772162b7
SHA512fdcba01191a345416f17fb4024255f97af135824f1ce57bb8456d74fbfd0e37f89500aeb92c19c4add62e6cb416c57cd06b2aee310fabb91e468852ca062ff0e
-
Filesize
123KB
MD541cdf1d40aff3f71114ea210307b6a1c
SHA18d5237ed7a29003af5b857edd85f7f54a91f600c
SHA25600ba79fa51af9b735ebbded72313232d83956c922e206362f9b71411772162b7
SHA512fdcba01191a345416f17fb4024255f97af135824f1ce57bb8456d74fbfd0e37f89500aeb92c19c4add62e6cb416c57cd06b2aee310fabb91e468852ca062ff0e
-
Filesize
123KB
MD541cdf1d40aff3f71114ea210307b6a1c
SHA18d5237ed7a29003af5b857edd85f7f54a91f600c
SHA25600ba79fa51af9b735ebbded72313232d83956c922e206362f9b71411772162b7
SHA512fdcba01191a345416f17fb4024255f97af135824f1ce57bb8456d74fbfd0e37f89500aeb92c19c4add62e6cb416c57cd06b2aee310fabb91e468852ca062ff0e
-
Filesize
123KB
MD541cdf1d40aff3f71114ea210307b6a1c
SHA18d5237ed7a29003af5b857edd85f7f54a91f600c
SHA25600ba79fa51af9b735ebbded72313232d83956c922e206362f9b71411772162b7
SHA512fdcba01191a345416f17fb4024255f97af135824f1ce57bb8456d74fbfd0e37f89500aeb92c19c4add62e6cb416c57cd06b2aee310fabb91e468852ca062ff0e