Analysis
-
max time kernel
169s -
max time network
186s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 01:48
Static task
static1
Behavioral task
behavioral1
Sample
e9c8d9b4f457ec13cae760743f1ffdc3b3536afdd684f0654111360f1655034e.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e9c8d9b4f457ec13cae760743f1ffdc3b3536afdd684f0654111360f1655034e.dll
Resource
win10v2004-20220812-en
General
-
Target
e9c8d9b4f457ec13cae760743f1ffdc3b3536afdd684f0654111360f1655034e.dll
-
Size
164KB
-
MD5
a64533c99725bd1cc97366505cf9a0b0
-
SHA1
2dfe060847ea269e7bb6d64cc6215a335199e444
-
SHA256
e9c8d9b4f457ec13cae760743f1ffdc3b3536afdd684f0654111360f1655034e
-
SHA512
35ef67c5f418cbcee3db86278c90d23f2021c08266a6df6c9da96f9f55c621c3bc3895c1d9bad82c4c0dd5ac99876dcbb379b963f29fc0c923617c6753824356
-
SSDEEP
3072:an4cV8gf2u41Z5tKlhpjDoT5zByq57bUIw:g4y8gOl2doT715/UI
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,c:\\program files (x86)\\microsoft\\watermark.exe" svchost.exe -
Executes dropped EXE 2 IoCs
pid Process 948 rundll32Srv.exe 896 WaterMark.exe -
resource yara_rule behavioral1/files/0x000a00000001347b-56.dat upx behavioral1/files/0x000a00000001347b-57.dat upx behavioral1/files/0x000a00000001347b-59.dat upx behavioral1/files/0x000a00000001347b-61.dat upx behavioral1/files/0x0007000000014129-62.dat upx behavioral1/files/0x0007000000014129-63.dat upx behavioral1/files/0x0007000000014129-65.dat upx behavioral1/memory/948-66-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/896-67-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/files/0x0007000000014129-68.dat upx behavioral1/memory/896-78-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral1/memory/896-196-0x0000000000400000-0x0000000000453000-memory.dmp upx -
Loads dropped DLL 4 IoCs
pid Process 960 rundll32.exe 960 rundll32.exe 948 rundll32Srv.exe 948 rundll32Srv.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\dmlconf.dat svchost.exe File created C:\Windows\SysWOW64\rundll32Srv.exe rundll32.exe File created C:\Windows\SysWOW64\dmlconf.dat svchost.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\pxB5E8.tmp rundll32Srv.exe File created C:\Program Files (x86)\Microsoft\WaterMark.exe rundll32Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe rundll32Srv.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 896 WaterMark.exe 896 WaterMark.exe 896 WaterMark.exe 896 WaterMark.exe 896 WaterMark.exe 896 WaterMark.exe 896 WaterMark.exe 896 WaterMark.exe 1556 svchost.exe 1556 svchost.exe 1556 svchost.exe 1556 svchost.exe 1556 svchost.exe 1556 svchost.exe 1556 svchost.exe 1556 svchost.exe 1556 svchost.exe 1556 svchost.exe 1556 svchost.exe 1556 svchost.exe 1556 svchost.exe 1556 svchost.exe 1556 svchost.exe 1556 svchost.exe 1556 svchost.exe 1556 svchost.exe 1556 svchost.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 896 WaterMark.exe Token: SeDebugPrivilege 1556 svchost.exe Token: SeDebugPrivilege 896 WaterMark.exe Token: SeDebugPrivilege 520 svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2040 wrote to memory of 960 2040 rundll32.exe 28 PID 2040 wrote to memory of 960 2040 rundll32.exe 28 PID 2040 wrote to memory of 960 2040 rundll32.exe 28 PID 2040 wrote to memory of 960 2040 rundll32.exe 28 PID 2040 wrote to memory of 960 2040 rundll32.exe 28 PID 2040 wrote to memory of 960 2040 rundll32.exe 28 PID 2040 wrote to memory of 960 2040 rundll32.exe 28 PID 960 wrote to memory of 948 960 rundll32.exe 29 PID 960 wrote to memory of 948 960 rundll32.exe 29 PID 960 wrote to memory of 948 960 rundll32.exe 29 PID 960 wrote to memory of 948 960 rundll32.exe 29 PID 948 wrote to memory of 896 948 rundll32Srv.exe 30 PID 948 wrote to memory of 896 948 rundll32Srv.exe 30 PID 948 wrote to memory of 896 948 rundll32Srv.exe 30 PID 948 wrote to memory of 896 948 rundll32Srv.exe 30 PID 896 wrote to memory of 520 896 WaterMark.exe 31 PID 896 wrote to memory of 520 896 WaterMark.exe 31 PID 896 wrote to memory of 520 896 WaterMark.exe 31 PID 896 wrote to memory of 520 896 WaterMark.exe 31 PID 896 wrote to memory of 520 896 WaterMark.exe 31 PID 896 wrote to memory of 520 896 WaterMark.exe 31 PID 896 wrote to memory of 520 896 WaterMark.exe 31 PID 896 wrote to memory of 520 896 WaterMark.exe 31 PID 896 wrote to memory of 520 896 WaterMark.exe 31 PID 896 wrote to memory of 520 896 WaterMark.exe 31 PID 896 wrote to memory of 1556 896 WaterMark.exe 32 PID 896 wrote to memory of 1556 896 WaterMark.exe 32 PID 896 wrote to memory of 1556 896 WaterMark.exe 32 PID 896 wrote to memory of 1556 896 WaterMark.exe 32 PID 896 wrote to memory of 1556 896 WaterMark.exe 32 PID 896 wrote to memory of 1556 896 WaterMark.exe 32 PID 896 wrote to memory of 1556 896 WaterMark.exe 32 PID 896 wrote to memory of 1556 896 WaterMark.exe 32 PID 896 wrote to memory of 1556 896 WaterMark.exe 32 PID 896 wrote to memory of 1556 896 WaterMark.exe 32 PID 1556 wrote to memory of 260 1556 svchost.exe 27 PID 1556 wrote to memory of 260 1556 svchost.exe 27 PID 1556 wrote to memory of 260 1556 svchost.exe 27 PID 1556 wrote to memory of 260 1556 svchost.exe 27 PID 1556 wrote to memory of 260 1556 svchost.exe 27 PID 1556 wrote to memory of 332 1556 svchost.exe 26 PID 1556 wrote to memory of 332 1556 svchost.exe 26 PID 1556 wrote to memory of 332 1556 svchost.exe 26 PID 1556 wrote to memory of 332 1556 svchost.exe 26 PID 1556 wrote to memory of 332 1556 svchost.exe 26 PID 1556 wrote to memory of 368 1556 svchost.exe 25 PID 1556 wrote to memory of 368 1556 svchost.exe 25 PID 1556 wrote to memory of 368 1556 svchost.exe 25 PID 1556 wrote to memory of 368 1556 svchost.exe 25 PID 1556 wrote to memory of 368 1556 svchost.exe 25 PID 1556 wrote to memory of 380 1556 svchost.exe 24 PID 1556 wrote to memory of 380 1556 svchost.exe 24 PID 1556 wrote to memory of 380 1556 svchost.exe 24 PID 1556 wrote to memory of 380 1556 svchost.exe 24 PID 1556 wrote to memory of 380 1556 svchost.exe 24 PID 1556 wrote to memory of 416 1556 svchost.exe 23 PID 1556 wrote to memory of 416 1556 svchost.exe 23 PID 1556 wrote to memory of 416 1556 svchost.exe 23 PID 1556 wrote to memory of 416 1556 svchost.exe 23 PID 1556 wrote to memory of 416 1556 svchost.exe 23 PID 1556 wrote to memory of 460 1556 svchost.exe 22 PID 1556 wrote to memory of 460 1556 svchost.exe 22 PID 1556 wrote to memory of 460 1556 svchost.exe 22 PID 1556 wrote to memory of 460 1556 svchost.exe 22
Processes
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe1⤵PID:1912
-
\\?\C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R1⤵PID:1992
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe1⤵PID:1096
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation1⤵PID:1768
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e9c8d9b4f457ec13cae760743f1ffdc3b3536afdd684f0654111360f1655034e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e9c8d9b4f457ec13cae760743f1ffdc3b3536afdd684f0654111360f1655034e.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Windows\SysWOW64\rundll32Srv.exeC:\Windows\SysWOW64\rundll32Srv.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe5⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:520
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1556
-
-
-
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1312
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1276
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1176
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork1⤵PID:1060
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:108
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService1⤵PID:296
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs1⤵PID:876
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService1⤵PID:852
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted1⤵PID:804
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted1⤵PID:764
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS1⤵PID:680
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch1⤵PID:600
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe1⤵PID:484
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:476
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵PID:460
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:416
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:380
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:368
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:332
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe1⤵PID:260
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD5181eb934177edfabbc1af33322d7e194
SHA152d113dc0ef1462dddb8e9e21d73e50856c28fd6
SHA256207fb1bd8d3c387eb10dffb6db7cbd1c68e89356f7beedb7931f0b04ef3e1606
SHA5124f3502b065772eb59365f19396e866c0d7f494b836bf7460cc43a5413e2aefd00e223b51c4d824246ca7dacfd4bc1c48ec30f4c0386aa30c72bb1ff0621874fb
-
Filesize
73KB
MD5181eb934177edfabbc1af33322d7e194
SHA152d113dc0ef1462dddb8e9e21d73e50856c28fd6
SHA256207fb1bd8d3c387eb10dffb6db7cbd1c68e89356f7beedb7931f0b04ef3e1606
SHA5124f3502b065772eb59365f19396e866c0d7f494b836bf7460cc43a5413e2aefd00e223b51c4d824246ca7dacfd4bc1c48ec30f4c0386aa30c72bb1ff0621874fb
-
Filesize
73KB
MD5181eb934177edfabbc1af33322d7e194
SHA152d113dc0ef1462dddb8e9e21d73e50856c28fd6
SHA256207fb1bd8d3c387eb10dffb6db7cbd1c68e89356f7beedb7931f0b04ef3e1606
SHA5124f3502b065772eb59365f19396e866c0d7f494b836bf7460cc43a5413e2aefd00e223b51c4d824246ca7dacfd4bc1c48ec30f4c0386aa30c72bb1ff0621874fb
-
Filesize
73KB
MD5181eb934177edfabbc1af33322d7e194
SHA152d113dc0ef1462dddb8e9e21d73e50856c28fd6
SHA256207fb1bd8d3c387eb10dffb6db7cbd1c68e89356f7beedb7931f0b04ef3e1606
SHA5124f3502b065772eb59365f19396e866c0d7f494b836bf7460cc43a5413e2aefd00e223b51c4d824246ca7dacfd4bc1c48ec30f4c0386aa30c72bb1ff0621874fb
-
Filesize
73KB
MD5181eb934177edfabbc1af33322d7e194
SHA152d113dc0ef1462dddb8e9e21d73e50856c28fd6
SHA256207fb1bd8d3c387eb10dffb6db7cbd1c68e89356f7beedb7931f0b04ef3e1606
SHA5124f3502b065772eb59365f19396e866c0d7f494b836bf7460cc43a5413e2aefd00e223b51c4d824246ca7dacfd4bc1c48ec30f4c0386aa30c72bb1ff0621874fb
-
Filesize
73KB
MD5181eb934177edfabbc1af33322d7e194
SHA152d113dc0ef1462dddb8e9e21d73e50856c28fd6
SHA256207fb1bd8d3c387eb10dffb6db7cbd1c68e89356f7beedb7931f0b04ef3e1606
SHA5124f3502b065772eb59365f19396e866c0d7f494b836bf7460cc43a5413e2aefd00e223b51c4d824246ca7dacfd4bc1c48ec30f4c0386aa30c72bb1ff0621874fb
-
Filesize
73KB
MD5181eb934177edfabbc1af33322d7e194
SHA152d113dc0ef1462dddb8e9e21d73e50856c28fd6
SHA256207fb1bd8d3c387eb10dffb6db7cbd1c68e89356f7beedb7931f0b04ef3e1606
SHA5124f3502b065772eb59365f19396e866c0d7f494b836bf7460cc43a5413e2aefd00e223b51c4d824246ca7dacfd4bc1c48ec30f4c0386aa30c72bb1ff0621874fb
-
Filesize
73KB
MD5181eb934177edfabbc1af33322d7e194
SHA152d113dc0ef1462dddb8e9e21d73e50856c28fd6
SHA256207fb1bd8d3c387eb10dffb6db7cbd1c68e89356f7beedb7931f0b04ef3e1606
SHA5124f3502b065772eb59365f19396e866c0d7f494b836bf7460cc43a5413e2aefd00e223b51c4d824246ca7dacfd4bc1c48ec30f4c0386aa30c72bb1ff0621874fb