Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 02:10
Static task
static1
Behavioral task
behavioral1
Sample
7d7216180cb381b170bb109c66fec17009987739488f9367f155ad684224de57.dll
Resource
win7-20220812-en
General
-
Target
7d7216180cb381b170bb109c66fec17009987739488f9367f155ad684224de57.dll
-
Size
448KB
-
MD5
a42721cc7397c003ff00e9a36a310fe0
-
SHA1
7d971d95410d4f1dac405346ea9187647fd6f829
-
SHA256
7d7216180cb381b170bb109c66fec17009987739488f9367f155ad684224de57
-
SHA512
e610b41a170ed7fd2af7bd8ca33e7f08fd5f6e8628317ee484820c70c9c1c9ca530afcb2dad82aea70712a92755995bbc4ccbaad2c25264f0e85e06b0e6e9d23
-
SSDEEP
12288:fehnaNPpSVZmNxRCwnwm3W3OHIIf5UnDrZ3W:feh0PpS6NxNnwYeOHX+p3W
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,c:\\program files (x86)\\microsoft\\watermark.exe" svchost.exe -
Executes dropped EXE 2 IoCs
pid Process 1948 rundll32mgr.exe 1340 WaterMark.exe -
resource yara_rule behavioral1/memory/1948-65-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1340-79-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1340-207-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Loads dropped DLL 4 IoCs
pid Process 1956 rundll32.exe 1956 rundll32.exe 1948 rundll32mgr.exe 1948 rundll32mgr.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe File created C:\Windows\SysWOW64\dmlconf.dat svchost.exe File opened for modification C:\Windows\SysWOW64\dmlconf.dat svchost.exe -
Drops file in Program Files directory 10 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\7zFM.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7zG.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\pxF95D.tmp rundll32mgr.exe File opened for modification C:\Program Files\7-Zip\7z.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7-zip.dll svchost.exe File opened for modification C:\Program Files\7-Zip\7-zip32.dll svchost.exe File opened for modification C:\Program Files\7-Zip\7z.dll svchost.exe File created C:\Program Files (x86)\Microsoft\WaterMark.exe rundll32mgr.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe rundll32mgr.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1524 1956 WerFault.exe 28 -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 1340 WaterMark.exe 1340 WaterMark.exe 1340 WaterMark.exe 1340 WaterMark.exe 1340 WaterMark.exe 1340 WaterMark.exe 1340 WaterMark.exe 1340 WaterMark.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe 608 svchost.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1340 WaterMark.exe Token: SeDebugPrivilege 608 svchost.exe Token: SeDebugPrivilege 1956 rundll32.exe Token: SeDebugPrivilege 1524 WerFault.exe Token: SeDebugPrivilege 1340 WaterMark.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1636 wrote to memory of 1956 1636 rundll32.exe 28 PID 1636 wrote to memory of 1956 1636 rundll32.exe 28 PID 1636 wrote to memory of 1956 1636 rundll32.exe 28 PID 1636 wrote to memory of 1956 1636 rundll32.exe 28 PID 1636 wrote to memory of 1956 1636 rundll32.exe 28 PID 1636 wrote to memory of 1956 1636 rundll32.exe 28 PID 1636 wrote to memory of 1956 1636 rundll32.exe 28 PID 1956 wrote to memory of 1948 1956 rundll32.exe 29 PID 1956 wrote to memory of 1948 1956 rundll32.exe 29 PID 1956 wrote to memory of 1948 1956 rundll32.exe 29 PID 1956 wrote to memory of 1948 1956 rundll32.exe 29 PID 1956 wrote to memory of 1524 1956 rundll32.exe 30 PID 1948 wrote to memory of 1340 1948 rundll32mgr.exe 31 PID 1948 wrote to memory of 1340 1948 rundll32mgr.exe 31 PID 1948 wrote to memory of 1340 1948 rundll32mgr.exe 31 PID 1948 wrote to memory of 1340 1948 rundll32mgr.exe 31 PID 1956 wrote to memory of 1524 1956 rundll32.exe 30 PID 1956 wrote to memory of 1524 1956 rundll32.exe 30 PID 1956 wrote to memory of 1524 1956 rundll32.exe 30 PID 1340 wrote to memory of 1708 1340 WaterMark.exe 32 PID 1340 wrote to memory of 1708 1340 WaterMark.exe 32 PID 1340 wrote to memory of 1708 1340 WaterMark.exe 32 PID 1340 wrote to memory of 1708 1340 WaterMark.exe 32 PID 1340 wrote to memory of 1708 1340 WaterMark.exe 32 PID 1340 wrote to memory of 1708 1340 WaterMark.exe 32 PID 1340 wrote to memory of 1708 1340 WaterMark.exe 32 PID 1340 wrote to memory of 1708 1340 WaterMark.exe 32 PID 1340 wrote to memory of 1708 1340 WaterMark.exe 32 PID 1340 wrote to memory of 1708 1340 WaterMark.exe 32 PID 1340 wrote to memory of 608 1340 WaterMark.exe 33 PID 1340 wrote to memory of 608 1340 WaterMark.exe 33 PID 1340 wrote to memory of 608 1340 WaterMark.exe 33 PID 1340 wrote to memory of 608 1340 WaterMark.exe 33 PID 1340 wrote to memory of 608 1340 WaterMark.exe 33 PID 1340 wrote to memory of 608 1340 WaterMark.exe 33 PID 1340 wrote to memory of 608 1340 WaterMark.exe 33 PID 1340 wrote to memory of 608 1340 WaterMark.exe 33 PID 1340 wrote to memory of 608 1340 WaterMark.exe 33 PID 1340 wrote to memory of 608 1340 WaterMark.exe 33 PID 608 wrote to memory of 260 608 svchost.exe 27 PID 608 wrote to memory of 260 608 svchost.exe 27 PID 608 wrote to memory of 260 608 svchost.exe 27 PID 608 wrote to memory of 260 608 svchost.exe 27 PID 608 wrote to memory of 260 608 svchost.exe 27 PID 608 wrote to memory of 336 608 svchost.exe 26 PID 608 wrote to memory of 336 608 svchost.exe 26 PID 608 wrote to memory of 336 608 svchost.exe 26 PID 608 wrote to memory of 336 608 svchost.exe 26 PID 608 wrote to memory of 336 608 svchost.exe 26 PID 608 wrote to memory of 372 608 svchost.exe 5 PID 608 wrote to memory of 372 608 svchost.exe 5 PID 608 wrote to memory of 372 608 svchost.exe 5 PID 608 wrote to memory of 372 608 svchost.exe 5 PID 608 wrote to memory of 372 608 svchost.exe 5 PID 608 wrote to memory of 384 608 svchost.exe 4 PID 608 wrote to memory of 384 608 svchost.exe 4 PID 608 wrote to memory of 384 608 svchost.exe 4 PID 608 wrote to memory of 384 608 svchost.exe 4 PID 608 wrote to memory of 384 608 svchost.exe 4 PID 608 wrote to memory of 420 608 svchost.exe 3 PID 608 wrote to memory of 420 608 svchost.exe 3 PID 608 wrote to memory of 420 608 svchost.exe 3 PID 608 wrote to memory of 420 608 svchost.exe 3 PID 608 wrote to memory of 420 608 svchost.exe 3
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:480
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵PID:472
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵PID:804
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"3⤵PID:1164
-
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵PID:1120
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵PID:1032
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵PID:1772
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵PID:1076
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵PID:744
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵PID:300
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵PID:888
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵PID:836
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:760
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵PID:672
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵PID:592
-
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:420
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:384
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:372
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:488
-
-
\\?\C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R1⤵PID:1992
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe1⤵PID:2036
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7d7216180cb381b170bb109c66fec17009987739488f9367f155ad684224de57.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7d7216180cb381b170bb109c66fec17009987739488f9367f155ad684224de57.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe5⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Drops file in Program Files directory
PID:1708
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:608
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1956 -s 2283⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:1524
-
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1196
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:336
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe1⤵PID:260
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5a9ea94ee4a3bb43d4057823b2072dc54
SHA194ade3c34ec08613daba8a1240586c24f8169794
SHA2567edbb67a880d90e53ec7949c4907f4ccf5596899b98ed8651b01a485a7b06789
SHA5120ae24a452c474a0b67eb17ceb78eabc46aad7f04a249d526cbd1bf25ccc94016133ee6cdd1cf342fa3c8dbff60372d18df56137a6c0303bbaee07f005f930ab5
-
Filesize
65KB
MD5a9ea94ee4a3bb43d4057823b2072dc54
SHA194ade3c34ec08613daba8a1240586c24f8169794
SHA2567edbb67a880d90e53ec7949c4907f4ccf5596899b98ed8651b01a485a7b06789
SHA5120ae24a452c474a0b67eb17ceb78eabc46aad7f04a249d526cbd1bf25ccc94016133ee6cdd1cf342fa3c8dbff60372d18df56137a6c0303bbaee07f005f930ab5
-
Filesize
65KB
MD5a9ea94ee4a3bb43d4057823b2072dc54
SHA194ade3c34ec08613daba8a1240586c24f8169794
SHA2567edbb67a880d90e53ec7949c4907f4ccf5596899b98ed8651b01a485a7b06789
SHA5120ae24a452c474a0b67eb17ceb78eabc46aad7f04a249d526cbd1bf25ccc94016133ee6cdd1cf342fa3c8dbff60372d18df56137a6c0303bbaee07f005f930ab5
-
Filesize
65KB
MD5a9ea94ee4a3bb43d4057823b2072dc54
SHA194ade3c34ec08613daba8a1240586c24f8169794
SHA2567edbb67a880d90e53ec7949c4907f4ccf5596899b98ed8651b01a485a7b06789
SHA5120ae24a452c474a0b67eb17ceb78eabc46aad7f04a249d526cbd1bf25ccc94016133ee6cdd1cf342fa3c8dbff60372d18df56137a6c0303bbaee07f005f930ab5
-
Filesize
65KB
MD5a9ea94ee4a3bb43d4057823b2072dc54
SHA194ade3c34ec08613daba8a1240586c24f8169794
SHA2567edbb67a880d90e53ec7949c4907f4ccf5596899b98ed8651b01a485a7b06789
SHA5120ae24a452c474a0b67eb17ceb78eabc46aad7f04a249d526cbd1bf25ccc94016133ee6cdd1cf342fa3c8dbff60372d18df56137a6c0303bbaee07f005f930ab5
-
Filesize
65KB
MD5a9ea94ee4a3bb43d4057823b2072dc54
SHA194ade3c34ec08613daba8a1240586c24f8169794
SHA2567edbb67a880d90e53ec7949c4907f4ccf5596899b98ed8651b01a485a7b06789
SHA5120ae24a452c474a0b67eb17ceb78eabc46aad7f04a249d526cbd1bf25ccc94016133ee6cdd1cf342fa3c8dbff60372d18df56137a6c0303bbaee07f005f930ab5
-
Filesize
65KB
MD5a9ea94ee4a3bb43d4057823b2072dc54
SHA194ade3c34ec08613daba8a1240586c24f8169794
SHA2567edbb67a880d90e53ec7949c4907f4ccf5596899b98ed8651b01a485a7b06789
SHA5120ae24a452c474a0b67eb17ceb78eabc46aad7f04a249d526cbd1bf25ccc94016133ee6cdd1cf342fa3c8dbff60372d18df56137a6c0303bbaee07f005f930ab5
-
Filesize
65KB
MD5a9ea94ee4a3bb43d4057823b2072dc54
SHA194ade3c34ec08613daba8a1240586c24f8169794
SHA2567edbb67a880d90e53ec7949c4907f4ccf5596899b98ed8651b01a485a7b06789
SHA5120ae24a452c474a0b67eb17ceb78eabc46aad7f04a249d526cbd1bf25ccc94016133ee6cdd1cf342fa3c8dbff60372d18df56137a6c0303bbaee07f005f930ab5