Analysis
-
max time kernel
195s -
max time network
204s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 01:47
Static task
static1
Behavioral task
behavioral1
Sample
edd9b9188e6b37ac06a6d3f8842fbbec678a2614017a477203b744674d169209.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
edd9b9188e6b37ac06a6d3f8842fbbec678a2614017a477203b744674d169209.dll
Resource
win10v2004-20221111-en
General
-
Target
edd9b9188e6b37ac06a6d3f8842fbbec678a2614017a477203b744674d169209.dll
-
Size
472KB
-
MD5
ac7f900aca6e9d4d1a1b6ba837bbfb20
-
SHA1
ea3351df2a4893f660d61099f8c6bb2eb5396768
-
SHA256
edd9b9188e6b37ac06a6d3f8842fbbec678a2614017a477203b744674d169209
-
SHA512
ef9f6d54ddc2bba2a676e153ff4c383b6a967f6ccd255ceb7777e83323227f4a23db6f601c76c50b316bcdce8a44efc6fbe14e54216239c93ca3d699e85cc05b
-
SSDEEP
12288:AehnaNPpSVZmNxRCwnwm3W3OHIIf5SxT8Hc:Aeh0PpS6NxNnwYeOHXbH
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,c:\\program files (x86)\\microsoft\\watermark.exe" svchost.exe -
Executes dropped EXE 2 IoCs
pid Process 1764 rundll32Srv.exe 1176 WaterMark.exe -
resource yara_rule behavioral1/files/0x000b00000001232f-56.dat upx behavioral1/files/0x000b00000001232f-57.dat upx behavioral1/files/0x000b00000001232f-59.dat upx behavioral1/memory/1764-64-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/files/0x000b00000001232f-65.dat upx behavioral1/files/0x0008000000012750-66.dat upx behavioral1/files/0x0008000000012750-67.dat upx behavioral1/files/0x0008000000012750-70.dat upx behavioral1/memory/1764-69-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/files/0x0008000000012750-71.dat upx behavioral1/memory/1176-81-0x0000000000400000-0x000000000045A000-memory.dmp upx behavioral1/memory/1176-215-0x0000000000400000-0x000000000045A000-memory.dmp upx -
Loads dropped DLL 4 IoCs
pid Process 1272 rundll32.exe 1272 rundll32.exe 1764 rundll32Srv.exe 1764 rundll32Srv.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32Srv.exe rundll32.exe File created C:\Windows\SysWOW64\dmlconf.dat svchost.exe File opened for modification C:\Windows\SysWOW64\dmlconf.dat svchost.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\pxEEC3.tmp rundll32Srv.exe File created C:\Program Files (x86)\Microsoft\WaterMark.exe rundll32Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe rundll32Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe svchost.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 992 1272 WerFault.exe 28 -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 1176 WaterMark.exe 1176 WaterMark.exe 1176 WaterMark.exe 1176 WaterMark.exe 1176 WaterMark.exe 1176 WaterMark.exe 1176 WaterMark.exe 1176 WaterMark.exe 1688 svchost.exe 1688 svchost.exe 1688 svchost.exe 1688 svchost.exe 1688 svchost.exe 1688 svchost.exe 1688 svchost.exe 1688 svchost.exe 1688 svchost.exe 1688 svchost.exe 1688 svchost.exe 1688 svchost.exe 1688 svchost.exe 1688 svchost.exe 1688 svchost.exe 1688 svchost.exe 1688 svchost.exe 1688 svchost.exe 1688 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 992 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1176 WaterMark.exe Token: SeDebugPrivilege 1688 svchost.exe Token: SeDebugPrivilege 1272 rundll32.exe Token: SeDebugPrivilege 992 WerFault.exe Token: SeDebugPrivilege 1176 WaterMark.exe Token: SeDebugPrivilege 1756 svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1192 wrote to memory of 1272 1192 rundll32.exe 28 PID 1192 wrote to memory of 1272 1192 rundll32.exe 28 PID 1192 wrote to memory of 1272 1192 rundll32.exe 28 PID 1192 wrote to memory of 1272 1192 rundll32.exe 28 PID 1192 wrote to memory of 1272 1192 rundll32.exe 28 PID 1192 wrote to memory of 1272 1192 rundll32.exe 28 PID 1192 wrote to memory of 1272 1192 rundll32.exe 28 PID 1272 wrote to memory of 1764 1272 rundll32.exe 29 PID 1272 wrote to memory of 1764 1272 rundll32.exe 29 PID 1272 wrote to memory of 1764 1272 rundll32.exe 29 PID 1272 wrote to memory of 1764 1272 rundll32.exe 29 PID 1272 wrote to memory of 992 1272 rundll32.exe 30 PID 1272 wrote to memory of 992 1272 rundll32.exe 30 PID 1272 wrote to memory of 992 1272 rundll32.exe 30 PID 1272 wrote to memory of 992 1272 rundll32.exe 30 PID 1764 wrote to memory of 1176 1764 rundll32Srv.exe 31 PID 1764 wrote to memory of 1176 1764 rundll32Srv.exe 31 PID 1764 wrote to memory of 1176 1764 rundll32Srv.exe 31 PID 1764 wrote to memory of 1176 1764 rundll32Srv.exe 31 PID 1176 wrote to memory of 1756 1176 WaterMark.exe 32 PID 1176 wrote to memory of 1756 1176 WaterMark.exe 32 PID 1176 wrote to memory of 1756 1176 WaterMark.exe 32 PID 1176 wrote to memory of 1756 1176 WaterMark.exe 32 PID 1176 wrote to memory of 1756 1176 WaterMark.exe 32 PID 1176 wrote to memory of 1756 1176 WaterMark.exe 32 PID 1176 wrote to memory of 1756 1176 WaterMark.exe 32 PID 1176 wrote to memory of 1756 1176 WaterMark.exe 32 PID 1176 wrote to memory of 1756 1176 WaterMark.exe 32 PID 1176 wrote to memory of 1756 1176 WaterMark.exe 32 PID 1176 wrote to memory of 1688 1176 WaterMark.exe 33 PID 1176 wrote to memory of 1688 1176 WaterMark.exe 33 PID 1176 wrote to memory of 1688 1176 WaterMark.exe 33 PID 1176 wrote to memory of 1688 1176 WaterMark.exe 33 PID 1176 wrote to memory of 1688 1176 WaterMark.exe 33 PID 1176 wrote to memory of 1688 1176 WaterMark.exe 33 PID 1176 wrote to memory of 1688 1176 WaterMark.exe 33 PID 1176 wrote to memory of 1688 1176 WaterMark.exe 33 PID 1176 wrote to memory of 1688 1176 WaterMark.exe 33 PID 1176 wrote to memory of 1688 1176 WaterMark.exe 33 PID 1688 wrote to memory of 260 1688 svchost.exe 26 PID 1688 wrote to memory of 260 1688 svchost.exe 26 PID 1688 wrote to memory of 260 1688 svchost.exe 26 PID 1688 wrote to memory of 260 1688 svchost.exe 26 PID 1688 wrote to memory of 260 1688 svchost.exe 26 PID 1688 wrote to memory of 332 1688 svchost.exe 6 PID 1688 wrote to memory of 332 1688 svchost.exe 6 PID 1688 wrote to memory of 332 1688 svchost.exe 6 PID 1688 wrote to memory of 332 1688 svchost.exe 6 PID 1688 wrote to memory of 332 1688 svchost.exe 6 PID 1688 wrote to memory of 368 1688 svchost.exe 5 PID 1688 wrote to memory of 368 1688 svchost.exe 5 PID 1688 wrote to memory of 368 1688 svchost.exe 5 PID 1688 wrote to memory of 368 1688 svchost.exe 5 PID 1688 wrote to memory of 368 1688 svchost.exe 5 PID 1688 wrote to memory of 384 1688 svchost.exe 4 PID 1688 wrote to memory of 384 1688 svchost.exe 4 PID 1688 wrote to memory of 384 1688 svchost.exe 4 PID 1688 wrote to memory of 384 1688 svchost.exe 4 PID 1688 wrote to memory of 384 1688 svchost.exe 4 PID 1688 wrote to memory of 420 1688 svchost.exe 3 PID 1688 wrote to memory of 420 1688 svchost.exe 3 PID 1688 wrote to memory of 420 1688 svchost.exe 3 PID 1688 wrote to memory of 420 1688 svchost.exe 3 PID 1688 wrote to memory of 420 1688 svchost.exe 3
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:480
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵PID:472
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:736
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵PID:304
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵PID:1016
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵PID:1112
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵PID:1032
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵PID:328
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵PID:276
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵PID:864
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵PID:836
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵PID:800
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵PID:656
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵PID:576
-
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:420
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:384
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:368
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:488
-
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:332
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1248
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\edd9b9188e6b37ac06a6d3f8842fbbec678a2614017a477203b744674d169209.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\edd9b9188e6b37ac06a6d3f8842fbbec678a2614017a477203b744674d169209.dll,#13⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\SysWOW64\rundll32Srv.exeC:\Windows\SysWOW64\rundll32Srv.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe6⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:1756
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1688
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1272 -s 2284⤵
- Program crash
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:992
-
-
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe1⤵PID:1976
-
\\?\C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R1⤵PID:1716
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1200
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe1⤵PID:260
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD5957486cc8375b15f517fdec2d5768559
SHA19df493ad9764c4a6010d6f202c1cff81921f548d
SHA2564d98da8a1542504e48bfec07f10204451c5490cab861fa1f1276f350e3a9dfec
SHA512f1f949241cf2f2d4dcced0f22fbe20a951f5ec9e0a046b3b630b71f19ae081f4fa950d28fa3762fada19dd6ceb894da34616103591842f101add089a01fea93a
-
Filesize
90KB
MD5957486cc8375b15f517fdec2d5768559
SHA19df493ad9764c4a6010d6f202c1cff81921f548d
SHA2564d98da8a1542504e48bfec07f10204451c5490cab861fa1f1276f350e3a9dfec
SHA512f1f949241cf2f2d4dcced0f22fbe20a951f5ec9e0a046b3b630b71f19ae081f4fa950d28fa3762fada19dd6ceb894da34616103591842f101add089a01fea93a
-
Filesize
90KB
MD5957486cc8375b15f517fdec2d5768559
SHA19df493ad9764c4a6010d6f202c1cff81921f548d
SHA2564d98da8a1542504e48bfec07f10204451c5490cab861fa1f1276f350e3a9dfec
SHA512f1f949241cf2f2d4dcced0f22fbe20a951f5ec9e0a046b3b630b71f19ae081f4fa950d28fa3762fada19dd6ceb894da34616103591842f101add089a01fea93a
-
Filesize
90KB
MD5957486cc8375b15f517fdec2d5768559
SHA19df493ad9764c4a6010d6f202c1cff81921f548d
SHA2564d98da8a1542504e48bfec07f10204451c5490cab861fa1f1276f350e3a9dfec
SHA512f1f949241cf2f2d4dcced0f22fbe20a951f5ec9e0a046b3b630b71f19ae081f4fa950d28fa3762fada19dd6ceb894da34616103591842f101add089a01fea93a
-
Filesize
90KB
MD5957486cc8375b15f517fdec2d5768559
SHA19df493ad9764c4a6010d6f202c1cff81921f548d
SHA2564d98da8a1542504e48bfec07f10204451c5490cab861fa1f1276f350e3a9dfec
SHA512f1f949241cf2f2d4dcced0f22fbe20a951f5ec9e0a046b3b630b71f19ae081f4fa950d28fa3762fada19dd6ceb894da34616103591842f101add089a01fea93a
-
Filesize
90KB
MD5957486cc8375b15f517fdec2d5768559
SHA19df493ad9764c4a6010d6f202c1cff81921f548d
SHA2564d98da8a1542504e48bfec07f10204451c5490cab861fa1f1276f350e3a9dfec
SHA512f1f949241cf2f2d4dcced0f22fbe20a951f5ec9e0a046b3b630b71f19ae081f4fa950d28fa3762fada19dd6ceb894da34616103591842f101add089a01fea93a
-
Filesize
90KB
MD5957486cc8375b15f517fdec2d5768559
SHA19df493ad9764c4a6010d6f202c1cff81921f548d
SHA2564d98da8a1542504e48bfec07f10204451c5490cab861fa1f1276f350e3a9dfec
SHA512f1f949241cf2f2d4dcced0f22fbe20a951f5ec9e0a046b3b630b71f19ae081f4fa950d28fa3762fada19dd6ceb894da34616103591842f101add089a01fea93a
-
Filesize
90KB
MD5957486cc8375b15f517fdec2d5768559
SHA19df493ad9764c4a6010d6f202c1cff81921f548d
SHA2564d98da8a1542504e48bfec07f10204451c5490cab861fa1f1276f350e3a9dfec
SHA512f1f949241cf2f2d4dcced0f22fbe20a951f5ec9e0a046b3b630b71f19ae081f4fa950d28fa3762fada19dd6ceb894da34616103591842f101add089a01fea93a