Analysis
-
max time kernel
153s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 06:48
Static task
static1
Behavioral task
behavioral1
Sample
b6a7db5c9e9b3ce7362bb47117dbce5a90bae618bb23a704adc40f070c8b700c.exe
Resource
win7-20220812-en
General
-
Target
b6a7db5c9e9b3ce7362bb47117dbce5a90bae618bb23a704adc40f070c8b700c.exe
-
Size
60KB
-
MD5
89d13aca5665c3fcde154dfc3c054f88
-
SHA1
b483fffd3c9843d75cac6330955dae40fd36f1ba
-
SHA256
b6a7db5c9e9b3ce7362bb47117dbce5a90bae618bb23a704adc40f070c8b700c
-
SHA512
bc8937142752f0a2806cb43f7a79df9bdded6fd3f4e4d6ff7a543273d528f1af1f053bfb52dbb8cc58f45322c23de0d26354fbc82a5f739078835b4bc1450651
-
SSDEEP
1536:VVZnxm6MG9xgfrvEaoiT/GyphjXDYjKwttoswRmhApE:FnxwgxgfR/DVG7wBpE
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,c:\\program files (x86)\\microsoft\\watermark.exe" svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 1348 WaterMark.exe -
resource yara_rule behavioral1/memory/1712-56-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1712-57-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1712-62-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1348-67-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral1/memory/1348-79-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral1/memory/1348-187-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1712-833-0x0000000000230000-0x0000000000260000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 1712 b6a7db5c9e9b3ce7362bb47117dbce5a90bae618bb23a704adc40f070c8b700c.exe 1712 b6a7db5c9e9b3ce7362bb47117dbce5a90bae618bb23a704adc40f070c8b700c.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\dmlconf.dat svchost.exe File opened for modification C:\Windows\SysWOW64\dmlconf.dat svchost.exe -
Drops file in Program Files directory 10 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\7-zip.dll svchost.exe File opened for modification C:\Program Files\7-Zip\7z.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\px1DBF.tmp b6a7db5c9e9b3ce7362bb47117dbce5a90bae618bb23a704adc40f070c8b700c.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe b6a7db5c9e9b3ce7362bb47117dbce5a90bae618bb23a704adc40f070c8b700c.exe File opened for modification C:\Program Files\7-Zip\7-zip32.dll svchost.exe File opened for modification C:\Program Files\7-Zip\7z.dll svchost.exe File opened for modification C:\Program Files\7-Zip\7zG.exe svchost.exe File created C:\Program Files (x86)\Microsoft\WaterMark.exe b6a7db5c9e9b3ce7362bb47117dbce5a90bae618bb23a704adc40f070c8b700c.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe svchost.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 1348 WaterMark.exe 1348 WaterMark.exe 1348 WaterMark.exe 1348 WaterMark.exe 1348 WaterMark.exe 1348 WaterMark.exe 1348 WaterMark.exe 1348 WaterMark.exe 576 svchost.exe 576 svchost.exe 576 svchost.exe 576 svchost.exe 576 svchost.exe 576 svchost.exe 576 svchost.exe 576 svchost.exe 576 svchost.exe 576 svchost.exe 576 svchost.exe 576 svchost.exe 576 svchost.exe 576 svchost.exe 576 svchost.exe 576 svchost.exe 576 svchost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1348 WaterMark.exe Token: SeDebugPrivilege 576 svchost.exe Token: SeDebugPrivilege 1348 WaterMark.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1712 b6a7db5c9e9b3ce7362bb47117dbce5a90bae618bb23a704adc40f070c8b700c.exe 1348 WaterMark.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1712 wrote to memory of 1348 1712 b6a7db5c9e9b3ce7362bb47117dbce5a90bae618bb23a704adc40f070c8b700c.exe 27 PID 1712 wrote to memory of 1348 1712 b6a7db5c9e9b3ce7362bb47117dbce5a90bae618bb23a704adc40f070c8b700c.exe 27 PID 1712 wrote to memory of 1348 1712 b6a7db5c9e9b3ce7362bb47117dbce5a90bae618bb23a704adc40f070c8b700c.exe 27 PID 1712 wrote to memory of 1348 1712 b6a7db5c9e9b3ce7362bb47117dbce5a90bae618bb23a704adc40f070c8b700c.exe 27 PID 1348 wrote to memory of 1828 1348 WaterMark.exe 28 PID 1348 wrote to memory of 1828 1348 WaterMark.exe 28 PID 1348 wrote to memory of 1828 1348 WaterMark.exe 28 PID 1348 wrote to memory of 1828 1348 WaterMark.exe 28 PID 1348 wrote to memory of 1828 1348 WaterMark.exe 28 PID 1348 wrote to memory of 1828 1348 WaterMark.exe 28 PID 1348 wrote to memory of 1828 1348 WaterMark.exe 28 PID 1348 wrote to memory of 1828 1348 WaterMark.exe 28 PID 1348 wrote to memory of 1828 1348 WaterMark.exe 28 PID 1348 wrote to memory of 1828 1348 WaterMark.exe 28 PID 1348 wrote to memory of 576 1348 WaterMark.exe 29 PID 1348 wrote to memory of 576 1348 WaterMark.exe 29 PID 1348 wrote to memory of 576 1348 WaterMark.exe 29 PID 1348 wrote to memory of 576 1348 WaterMark.exe 29 PID 1348 wrote to memory of 576 1348 WaterMark.exe 29 PID 1348 wrote to memory of 576 1348 WaterMark.exe 29 PID 1348 wrote to memory of 576 1348 WaterMark.exe 29 PID 1348 wrote to memory of 576 1348 WaterMark.exe 29 PID 1348 wrote to memory of 576 1348 WaterMark.exe 29 PID 1348 wrote to memory of 576 1348 WaterMark.exe 29 PID 576 wrote to memory of 260 576 svchost.exe 7 PID 576 wrote to memory of 260 576 svchost.exe 7 PID 576 wrote to memory of 260 576 svchost.exe 7 PID 576 wrote to memory of 260 576 svchost.exe 7 PID 576 wrote to memory of 260 576 svchost.exe 7 PID 576 wrote to memory of 332 576 svchost.exe 6 PID 576 wrote to memory of 332 576 svchost.exe 6 PID 576 wrote to memory of 332 576 svchost.exe 6 PID 576 wrote to memory of 332 576 svchost.exe 6 PID 576 wrote to memory of 332 576 svchost.exe 6 PID 576 wrote to memory of 368 576 svchost.exe 5 PID 576 wrote to memory of 368 576 svchost.exe 5 PID 576 wrote to memory of 368 576 svchost.exe 5 PID 576 wrote to memory of 368 576 svchost.exe 5 PID 576 wrote to memory of 368 576 svchost.exe 5 PID 576 wrote to memory of 376 576 svchost.exe 4 PID 576 wrote to memory of 376 576 svchost.exe 4 PID 576 wrote to memory of 376 576 svchost.exe 4 PID 576 wrote to memory of 376 576 svchost.exe 4 PID 576 wrote to memory of 376 576 svchost.exe 4 PID 576 wrote to memory of 416 576 svchost.exe 3 PID 576 wrote to memory of 416 576 svchost.exe 3 PID 576 wrote to memory of 416 576 svchost.exe 3 PID 576 wrote to memory of 416 576 svchost.exe 3 PID 576 wrote to memory of 416 576 svchost.exe 3 PID 576 wrote to memory of 460 576 svchost.exe 2 PID 576 wrote to memory of 460 576 svchost.exe 2 PID 576 wrote to memory of 460 576 svchost.exe 2 PID 576 wrote to memory of 460 576 svchost.exe 2 PID 576 wrote to memory of 460 576 svchost.exe 2 PID 576 wrote to memory of 476 576 svchost.exe 1 PID 576 wrote to memory of 476 576 svchost.exe 1 PID 576 wrote to memory of 476 576 svchost.exe 1 PID 576 wrote to memory of 476 576 svchost.exe 1 PID 576 wrote to memory of 476 576 svchost.exe 1 PID 576 wrote to memory of 484 576 svchost.exe 26 PID 576 wrote to memory of 484 576 svchost.exe 26 PID 576 wrote to memory of 484 576 svchost.exe 26 PID 576 wrote to memory of 484 576 svchost.exe 26 PID 576 wrote to memory of 484 576 svchost.exe 26
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:476
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵PID:460
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵PID:588
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵PID:1720
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵PID:964
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵PID:1116
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵PID:1076
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵PID:748
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵PID:324
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵PID:888
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵PID:848
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵PID:808
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:732
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵PID:668
-
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:416
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:376
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:368
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:484
-
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:332
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe1⤵PID:260
-
\\?\C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R1⤵PID:1596
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1268
-
C:\Users\Admin\AppData\Local\Temp\b6a7db5c9e9b3ce7362bb47117dbce5a90bae618bb23a704adc40f070c8b700c.exe"C:\Users\Admin\AppData\Local\Temp\b6a7db5c9e9b3ce7362bb47117dbce5a90bae618bb23a704adc40f070c8b700c.exe"2⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe4⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Drops file in Program Files directory
PID:1828
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:576
-
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1180
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD589d13aca5665c3fcde154dfc3c054f88
SHA1b483fffd3c9843d75cac6330955dae40fd36f1ba
SHA256b6a7db5c9e9b3ce7362bb47117dbce5a90bae618bb23a704adc40f070c8b700c
SHA512bc8937142752f0a2806cb43f7a79df9bdded6fd3f4e4d6ff7a543273d528f1af1f053bfb52dbb8cc58f45322c23de0d26354fbc82a5f739078835b4bc1450651
-
Filesize
60KB
MD589d13aca5665c3fcde154dfc3c054f88
SHA1b483fffd3c9843d75cac6330955dae40fd36f1ba
SHA256b6a7db5c9e9b3ce7362bb47117dbce5a90bae618bb23a704adc40f070c8b700c
SHA512bc8937142752f0a2806cb43f7a79df9bdded6fd3f4e4d6ff7a543273d528f1af1f053bfb52dbb8cc58f45322c23de0d26354fbc82a5f739078835b4bc1450651
-
Filesize
60KB
MD589d13aca5665c3fcde154dfc3c054f88
SHA1b483fffd3c9843d75cac6330955dae40fd36f1ba
SHA256b6a7db5c9e9b3ce7362bb47117dbce5a90bae618bb23a704adc40f070c8b700c
SHA512bc8937142752f0a2806cb43f7a79df9bdded6fd3f4e4d6ff7a543273d528f1af1f053bfb52dbb8cc58f45322c23de0d26354fbc82a5f739078835b4bc1450651
-
Filesize
60KB
MD589d13aca5665c3fcde154dfc3c054f88
SHA1b483fffd3c9843d75cac6330955dae40fd36f1ba
SHA256b6a7db5c9e9b3ce7362bb47117dbce5a90bae618bb23a704adc40f070c8b700c
SHA512bc8937142752f0a2806cb43f7a79df9bdded6fd3f4e4d6ff7a543273d528f1af1f053bfb52dbb8cc58f45322c23de0d26354fbc82a5f739078835b4bc1450651