Analysis
-
max time kernel
186s -
max time network
196s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04/12/2022, 02:32
Static task
static1
Behavioral task
behavioral1
Sample
0c2c089d9341b6c1e1511cfe02d6cc3c2bca4a2ed451a174deda6fd8cb619296.dll
Resource
win7-20220812-en
General
-
Target
0c2c089d9341b6c1e1511cfe02d6cc3c2bca4a2ed451a174deda6fd8cb619296.dll
-
Size
2.3MB
-
MD5
0ff3cd66f402c409e341afaceeab1d1a
-
SHA1
fd3aa891831d41b727a8e47c2e17c47d221e7205
-
SHA256
0c2c089d9341b6c1e1511cfe02d6cc3c2bca4a2ed451a174deda6fd8cb619296
-
SHA512
fbe1e739a5ad1472718ed7d13e6e69cb0222b7c6eeb99959c8e2e4db4113a6a12fceebaf54a7539216277aedc24416526527306cd2756d4938653e6878aeab96
-
SSDEEP
49152:gU3U+ZYmxjpv7x4GFM/+b8dTMNh9Wr73h7NXSWEqNJO5hYTVMCRisKEt:giU2YmxjpDx4Zo8dYNh9q73h7NXYkRim
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2188 rundll32mgr.exe 5092 WaterMark.exe -
resource yara_rule behavioral2/memory/2188-139-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/2188-140-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/2188-143-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/5092-152-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/5092-153-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/5092-154-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/5092-155-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/5092-156-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\px201B.tmp rundll32mgr.exe File created C:\Program Files (x86)\Microsoft\WaterMark.exe rundll32mgr.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe rundll32mgr.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4300 3704 WerFault.exe 79 1900 4640 WerFault.exe 85 -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "493204391" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31001157" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{3FD6EB0B-7638-11ED-B696-F6A3911CAFFB} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "493204391" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31001157" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "377186924" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 5092 WaterMark.exe 5092 WaterMark.exe 5092 WaterMark.exe 5092 WaterMark.exe 5092 WaterMark.exe 5092 WaterMark.exe 5092 WaterMark.exe 5092 WaterMark.exe 5092 WaterMark.exe 5092 WaterMark.exe 5092 WaterMark.exe 5092 WaterMark.exe 5092 WaterMark.exe 5092 WaterMark.exe 5092 WaterMark.exe 5092 WaterMark.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1400 iexplore.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5092 WaterMark.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1400 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1400 iexplore.exe 1400 iexplore.exe 608 IEXPLORE.EXE 608 IEXPLORE.EXE 608 IEXPLORE.EXE 608 IEXPLORE.EXE -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2188 rundll32mgr.exe 5092 WaterMark.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 3068 wrote to memory of 3704 3068 rundll32.exe 79 PID 3068 wrote to memory of 3704 3068 rundll32.exe 79 PID 3068 wrote to memory of 3704 3068 rundll32.exe 79 PID 3704 wrote to memory of 2188 3704 rundll32.exe 80 PID 3704 wrote to memory of 2188 3704 rundll32.exe 80 PID 3704 wrote to memory of 2188 3704 rundll32.exe 80 PID 2188 wrote to memory of 5092 2188 rundll32mgr.exe 83 PID 2188 wrote to memory of 5092 2188 rundll32mgr.exe 83 PID 2188 wrote to memory of 5092 2188 rundll32mgr.exe 83 PID 5092 wrote to memory of 4640 5092 WaterMark.exe 85 PID 5092 wrote to memory of 4640 5092 WaterMark.exe 85 PID 5092 wrote to memory of 4640 5092 WaterMark.exe 85 PID 5092 wrote to memory of 4640 5092 WaterMark.exe 85 PID 5092 wrote to memory of 4640 5092 WaterMark.exe 85 PID 5092 wrote to memory of 4640 5092 WaterMark.exe 85 PID 5092 wrote to memory of 4640 5092 WaterMark.exe 85 PID 5092 wrote to memory of 4640 5092 WaterMark.exe 85 PID 5092 wrote to memory of 4640 5092 WaterMark.exe 85 PID 5092 wrote to memory of 5008 5092 WaterMark.exe 88 PID 5092 wrote to memory of 5008 5092 WaterMark.exe 88 PID 5092 wrote to memory of 1400 5092 WaterMark.exe 89 PID 5092 wrote to memory of 1400 5092 WaterMark.exe 89 PID 1400 wrote to memory of 608 1400 iexplore.exe 90 PID 1400 wrote to memory of 608 1400 iexplore.exe 90 PID 1400 wrote to memory of 608 1400 iexplore.exe 90
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0c2c089d9341b6c1e1511cfe02d6cc3c2bca4a2ed451a174deda6fd8cb619296.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0c2c089d9341b6c1e1511cfe02d6cc3c2bca4a2ed451a174deda6fd8cb619296.dll,#12⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe5⤵PID:4640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4640 -s 2046⤵
- Program crash
PID:1900
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Modifies Internet Explorer settings
PID:5008
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1400 CREDAT:17410 /prefetch:26⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:608
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3704 -s 6363⤵
- Program crash
PID:4300
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3704 -ip 37041⤵PID:1896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4640 -ip 46401⤵PID:2720
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5f3cd42733c9f17686eb97e547f595220
SHA163579bee2925fc4c6dc1c1d1c43548bdfb474e32
SHA25646eeefd6ce0063d613b07a8a4765b23ae0dd30c5ee5638294c696a81da47e758
SHA51282d426939e4d3155b7260eb9b67680652a68deebfc7391307a70647f17f8621d744389c791b1585f34b4aaf16ea309901363189b07a1962b0f3bdae3c3ef0fb4
-
Filesize
92KB
MD5f3cd42733c9f17686eb97e547f595220
SHA163579bee2925fc4c6dc1c1d1c43548bdfb474e32
SHA25646eeefd6ce0063d613b07a8a4765b23ae0dd30c5ee5638294c696a81da47e758
SHA51282d426939e4d3155b7260eb9b67680652a68deebfc7391307a70647f17f8621d744389c791b1585f34b4aaf16ea309901363189b07a1962b0f3bdae3c3ef0fb4
-
Filesize
92KB
MD5f3cd42733c9f17686eb97e547f595220
SHA163579bee2925fc4c6dc1c1d1c43548bdfb474e32
SHA25646eeefd6ce0063d613b07a8a4765b23ae0dd30c5ee5638294c696a81da47e758
SHA51282d426939e4d3155b7260eb9b67680652a68deebfc7391307a70647f17f8621d744389c791b1585f34b4aaf16ea309901363189b07a1962b0f3bdae3c3ef0fb4
-
Filesize
92KB
MD5f3cd42733c9f17686eb97e547f595220
SHA163579bee2925fc4c6dc1c1d1c43548bdfb474e32
SHA25646eeefd6ce0063d613b07a8a4765b23ae0dd30c5ee5638294c696a81da47e758
SHA51282d426939e4d3155b7260eb9b67680652a68deebfc7391307a70647f17f8621d744389c791b1585f34b4aaf16ea309901363189b07a1962b0f3bdae3c3ef0fb4