Analysis
-
max time kernel
264s -
max time network
356s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 01:49
Static task
static1
Behavioral task
behavioral1
Sample
e3eb3e50df9c3c20638f9da5f5dee7aaaaef0607abf04ecddace50017601b627.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e3eb3e50df9c3c20638f9da5f5dee7aaaaef0607abf04ecddace50017601b627.dll
Resource
win10v2004-20221111-en
General
-
Target
e3eb3e50df9c3c20638f9da5f5dee7aaaaef0607abf04ecddace50017601b627.dll
-
Size
472KB
-
MD5
d244182cbcd660b26578f55d9fcb4770
-
SHA1
bf0328fe0049c4b458c9fc6c51434ca2f5a01e30
-
SHA256
e3eb3e50df9c3c20638f9da5f5dee7aaaaef0607abf04ecddace50017601b627
-
SHA512
a469c8aaee38f8dc1a7bc174c69448dcdd0ec027f90627be39c0db223c84ba8364d716193f759f8e8faf06f81d812162cc7a5819cfa0f776f010b57342dac8a5
-
SSDEEP
12288:mehnaNPpSVZmNxRCwnwm3W3OHIIf5xtn7ZDG:meh0PpS6NxNnwYeOHXjV7ZDG
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,c:\\program files (x86)\\microsoft\\watermark.exe" svchost.exe -
Executes dropped EXE 2 IoCs
pid Process 1672 rundll32Srv.exe 1120 WaterMark.exe -
resource yara_rule behavioral1/files/0x000b00000001233d-56.dat upx behavioral1/memory/1872-58-0x00000000001C0000-0x000000000021B000-memory.dmp upx behavioral1/files/0x000b00000001233d-59.dat upx behavioral1/files/0x000b00000001233d-61.dat upx behavioral1/memory/1672-62-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/files/0x000b00000001233d-63.dat upx behavioral1/memory/1672-64-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/files/0x0009000000012731-65.dat upx behavioral1/files/0x0009000000012731-66.dat upx behavioral1/files/0x0009000000012731-68.dat upx behavioral1/files/0x0009000000012731-69.dat upx behavioral1/memory/1120-79-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/1120-197-0x0000000000400000-0x000000000045B000-memory.dmp upx -
Loads dropped DLL 4 IoCs
pid Process 1872 rundll32.exe 1872 rundll32.exe 1672 rundll32Srv.exe 1672 rundll32Srv.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32Srv.exe rundll32.exe File created C:\Windows\SysWOW64\dmlconf.dat svchost.exe File opened for modification C:\Windows\SysWOW64\dmlconf.dat svchost.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\WaterMark.exe rundll32Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe rundll32Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\px6F28.tmp rundll32Srv.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 1120 WaterMark.exe 1120 WaterMark.exe 1120 WaterMark.exe 1120 WaterMark.exe 1120 WaterMark.exe 1120 WaterMark.exe 1120 WaterMark.exe 1120 WaterMark.exe 1980 svchost.exe 1980 svchost.exe 1980 svchost.exe 1980 svchost.exe 1980 svchost.exe 1980 svchost.exe 1980 svchost.exe 1980 svchost.exe 1980 svchost.exe 1980 svchost.exe 1980 svchost.exe 1980 svchost.exe 1980 svchost.exe 1980 svchost.exe 1980 svchost.exe 1980 svchost.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1120 WaterMark.exe Token: SeDebugPrivilege 1980 svchost.exe Token: SeDebugPrivilege 1120 WaterMark.exe Token: SeDebugPrivilege 1532 svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 892 wrote to memory of 1872 892 rundll32.exe 28 PID 892 wrote to memory of 1872 892 rundll32.exe 28 PID 892 wrote to memory of 1872 892 rundll32.exe 28 PID 892 wrote to memory of 1872 892 rundll32.exe 28 PID 892 wrote to memory of 1872 892 rundll32.exe 28 PID 892 wrote to memory of 1872 892 rundll32.exe 28 PID 892 wrote to memory of 1872 892 rundll32.exe 28 PID 1872 wrote to memory of 1672 1872 rundll32.exe 29 PID 1872 wrote to memory of 1672 1872 rundll32.exe 29 PID 1872 wrote to memory of 1672 1872 rundll32.exe 29 PID 1872 wrote to memory of 1672 1872 rundll32.exe 29 PID 1672 wrote to memory of 1120 1672 rundll32Srv.exe 30 PID 1672 wrote to memory of 1120 1672 rundll32Srv.exe 30 PID 1672 wrote to memory of 1120 1672 rundll32Srv.exe 30 PID 1672 wrote to memory of 1120 1672 rundll32Srv.exe 30 PID 1120 wrote to memory of 1532 1120 WaterMark.exe 31 PID 1120 wrote to memory of 1532 1120 WaterMark.exe 31 PID 1120 wrote to memory of 1532 1120 WaterMark.exe 31 PID 1120 wrote to memory of 1532 1120 WaterMark.exe 31 PID 1120 wrote to memory of 1532 1120 WaterMark.exe 31 PID 1120 wrote to memory of 1532 1120 WaterMark.exe 31 PID 1120 wrote to memory of 1532 1120 WaterMark.exe 31 PID 1120 wrote to memory of 1532 1120 WaterMark.exe 31 PID 1120 wrote to memory of 1532 1120 WaterMark.exe 31 PID 1120 wrote to memory of 1532 1120 WaterMark.exe 31 PID 1120 wrote to memory of 1980 1120 WaterMark.exe 32 PID 1120 wrote to memory of 1980 1120 WaterMark.exe 32 PID 1120 wrote to memory of 1980 1120 WaterMark.exe 32 PID 1120 wrote to memory of 1980 1120 WaterMark.exe 32 PID 1120 wrote to memory of 1980 1120 WaterMark.exe 32 PID 1120 wrote to memory of 1980 1120 WaterMark.exe 32 PID 1120 wrote to memory of 1980 1120 WaterMark.exe 32 PID 1120 wrote to memory of 1980 1120 WaterMark.exe 32 PID 1120 wrote to memory of 1980 1120 WaterMark.exe 32 PID 1120 wrote to memory of 1980 1120 WaterMark.exe 32 PID 1980 wrote to memory of 260 1980 svchost.exe 7 PID 1980 wrote to memory of 260 1980 svchost.exe 7 PID 1980 wrote to memory of 260 1980 svchost.exe 7 PID 1980 wrote to memory of 260 1980 svchost.exe 7 PID 1980 wrote to memory of 260 1980 svchost.exe 7 PID 1980 wrote to memory of 332 1980 svchost.exe 6 PID 1980 wrote to memory of 332 1980 svchost.exe 6 PID 1980 wrote to memory of 332 1980 svchost.exe 6 PID 1980 wrote to memory of 332 1980 svchost.exe 6 PID 1980 wrote to memory of 332 1980 svchost.exe 6 PID 1980 wrote to memory of 368 1980 svchost.exe 5 PID 1980 wrote to memory of 368 1980 svchost.exe 5 PID 1980 wrote to memory of 368 1980 svchost.exe 5 PID 1980 wrote to memory of 368 1980 svchost.exe 5 PID 1980 wrote to memory of 368 1980 svchost.exe 5 PID 1980 wrote to memory of 380 1980 svchost.exe 4 PID 1980 wrote to memory of 380 1980 svchost.exe 4 PID 1980 wrote to memory of 380 1980 svchost.exe 4 PID 1980 wrote to memory of 380 1980 svchost.exe 4 PID 1980 wrote to memory of 380 1980 svchost.exe 4 PID 1980 wrote to memory of 416 1980 svchost.exe 3 PID 1980 wrote to memory of 416 1980 svchost.exe 3 PID 1980 wrote to memory of 416 1980 svchost.exe 3 PID 1980 wrote to memory of 416 1980 svchost.exe 3 PID 1980 wrote to memory of 416 1980 svchost.exe 3 PID 1980 wrote to memory of 460 1980 svchost.exe 2 PID 1980 wrote to memory of 460 1980 svchost.exe 2 PID 1980 wrote to memory of 460 1980 svchost.exe 2 PID 1980 wrote to memory of 460 1980 svchost.exe 2
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:476
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵PID:460
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵PID:1200
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵PID:772
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵PID:1128
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵PID:1044
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵PID:532
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵PID:280
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵PID:864
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵PID:832
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵PID:796
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:740
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵PID:656
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵PID:580
-
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:416
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:380
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:368
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:484
-
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:332
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe1⤵PID:260
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe1⤵PID:2004
-
\\?\C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R1⤵PID:1956
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1252
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e3eb3e50df9c3c20638f9da5f5dee7aaaaef0607abf04ecddace50017601b627.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e3eb3e50df9c3c20638f9da5f5dee7aaaaef0607abf04ecddace50017601b627.dll,#13⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Windows\SysWOW64\rundll32Srv.exeC:\Windows\SysWOW64\rundll32Srv.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe6⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:1532
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1980
-
-
-
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1180
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD591b07c6f70654a26ca1cd8cde6fb2a7e
SHA1789629859ed76191432fd7ab40cfa0487b580a6e
SHA25637417b870c644d70c09c773b828dbb451e33d4e74df2f66d9698ae090d240d15
SHA512077b62709e40c66304429acae5cccb953affa59791f2139d0b0e3e8a4610d38aa5dd6a44d9c857220245a9e746fb980a5dd0966d8b2795313ca7b6deeafd1dd2
-
Filesize
90KB
MD591b07c6f70654a26ca1cd8cde6fb2a7e
SHA1789629859ed76191432fd7ab40cfa0487b580a6e
SHA25637417b870c644d70c09c773b828dbb451e33d4e74df2f66d9698ae090d240d15
SHA512077b62709e40c66304429acae5cccb953affa59791f2139d0b0e3e8a4610d38aa5dd6a44d9c857220245a9e746fb980a5dd0966d8b2795313ca7b6deeafd1dd2
-
Filesize
90KB
MD591b07c6f70654a26ca1cd8cde6fb2a7e
SHA1789629859ed76191432fd7ab40cfa0487b580a6e
SHA25637417b870c644d70c09c773b828dbb451e33d4e74df2f66d9698ae090d240d15
SHA512077b62709e40c66304429acae5cccb953affa59791f2139d0b0e3e8a4610d38aa5dd6a44d9c857220245a9e746fb980a5dd0966d8b2795313ca7b6deeafd1dd2
-
Filesize
90KB
MD591b07c6f70654a26ca1cd8cde6fb2a7e
SHA1789629859ed76191432fd7ab40cfa0487b580a6e
SHA25637417b870c644d70c09c773b828dbb451e33d4e74df2f66d9698ae090d240d15
SHA512077b62709e40c66304429acae5cccb953affa59791f2139d0b0e3e8a4610d38aa5dd6a44d9c857220245a9e746fb980a5dd0966d8b2795313ca7b6deeafd1dd2
-
Filesize
90KB
MD591b07c6f70654a26ca1cd8cde6fb2a7e
SHA1789629859ed76191432fd7ab40cfa0487b580a6e
SHA25637417b870c644d70c09c773b828dbb451e33d4e74df2f66d9698ae090d240d15
SHA512077b62709e40c66304429acae5cccb953affa59791f2139d0b0e3e8a4610d38aa5dd6a44d9c857220245a9e746fb980a5dd0966d8b2795313ca7b6deeafd1dd2
-
Filesize
90KB
MD591b07c6f70654a26ca1cd8cde6fb2a7e
SHA1789629859ed76191432fd7ab40cfa0487b580a6e
SHA25637417b870c644d70c09c773b828dbb451e33d4e74df2f66d9698ae090d240d15
SHA512077b62709e40c66304429acae5cccb953affa59791f2139d0b0e3e8a4610d38aa5dd6a44d9c857220245a9e746fb980a5dd0966d8b2795313ca7b6deeafd1dd2
-
Filesize
90KB
MD591b07c6f70654a26ca1cd8cde6fb2a7e
SHA1789629859ed76191432fd7ab40cfa0487b580a6e
SHA25637417b870c644d70c09c773b828dbb451e33d4e74df2f66d9698ae090d240d15
SHA512077b62709e40c66304429acae5cccb953affa59791f2139d0b0e3e8a4610d38aa5dd6a44d9c857220245a9e746fb980a5dd0966d8b2795313ca7b6deeafd1dd2
-
Filesize
90KB
MD591b07c6f70654a26ca1cd8cde6fb2a7e
SHA1789629859ed76191432fd7ab40cfa0487b580a6e
SHA25637417b870c644d70c09c773b828dbb451e33d4e74df2f66d9698ae090d240d15
SHA512077b62709e40c66304429acae5cccb953affa59791f2139d0b0e3e8a4610d38aa5dd6a44d9c857220245a9e746fb980a5dd0966d8b2795313ca7b6deeafd1dd2