Analysis
-
max time kernel
157s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
04/12/2022, 02:12
Static task
static1
Behavioral task
behavioral1
Sample
769ae08e6e1189ebd0eebd460e25cc1b6ee614a119a5966d5c92ba18e6c36585.dll
Resource
win7-20221111-en
General
-
Target
769ae08e6e1189ebd0eebd460e25cc1b6ee614a119a5966d5c92ba18e6c36585.dll
-
Size
444KB
-
MD5
bf60e849797fdead87fd3c67d7376fd0
-
SHA1
c21c58c190aad0303041e9e53bfc92413cae25c2
-
SHA256
769ae08e6e1189ebd0eebd460e25cc1b6ee614a119a5966d5c92ba18e6c36585
-
SHA512
0868f45a64656a82ee87e9d0d31abee17063710106d16bd991272545131915545243f090f87fe301074dd33676077f3b72209bae4dddc921e3a23da1a4cfaef8
-
SSDEEP
12288:fehnaNPpSVZmNxRCwnwm3W3OHIIf5w9PeCc4QjUmk:feh0PpS6NxNnwYeOHXIPzQAmk
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4532 rundll32mgr.exe 4224 WaterMark.exe -
resource yara_rule behavioral2/memory/4532-137-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4532-136-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4532-138-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4532-139-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4532-142-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4224-151-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4224-152-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4224-153-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\px81A3.tmp rundll32mgr.exe File created C:\Program Files (x86)\Microsoft\WaterMark.exe rundll32mgr.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe rundll32mgr.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 204 1700 WerFault.exe 83 492 2256 WerFault.exe 89 -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31001153" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "48583074" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{24313E36-7634-11ED-BF5F-D668443210E4} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "48583074" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{283273D2-7634-11ED-BF5F-D668443210E4} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31001153" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "27332663" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31001153" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "377185182" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31001153" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "27332663" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 4224 WaterMark.exe 4224 WaterMark.exe 4224 WaterMark.exe 4224 WaterMark.exe 4224 WaterMark.exe 4224 WaterMark.exe 4224 WaterMark.exe 4224 WaterMark.exe 4224 WaterMark.exe 4224 WaterMark.exe 4224 WaterMark.exe 4224 WaterMark.exe 4224 WaterMark.exe 4224 WaterMark.exe 4224 WaterMark.exe 4224 WaterMark.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4224 WaterMark.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3688 iexplore.exe 3480 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 3480 iexplore.exe 3480 iexplore.exe 3688 iexplore.exe 3688 iexplore.exe 3888 IEXPLORE.EXE 3888 IEXPLORE.EXE 4948 IEXPLORE.EXE 4948 IEXPLORE.EXE 3888 IEXPLORE.EXE 3888 IEXPLORE.EXE -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4532 rundll32mgr.exe 4224 WaterMark.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 4252 wrote to memory of 1700 4252 rundll32.exe 83 PID 4252 wrote to memory of 1700 4252 rundll32.exe 83 PID 4252 wrote to memory of 1700 4252 rundll32.exe 83 PID 1700 wrote to memory of 4532 1700 rundll32.exe 85 PID 1700 wrote to memory of 4532 1700 rundll32.exe 85 PID 1700 wrote to memory of 4532 1700 rundll32.exe 85 PID 4532 wrote to memory of 4224 4532 rundll32mgr.exe 87 PID 4532 wrote to memory of 4224 4532 rundll32mgr.exe 87 PID 4532 wrote to memory of 4224 4532 rundll32mgr.exe 87 PID 4224 wrote to memory of 2256 4224 WaterMark.exe 89 PID 4224 wrote to memory of 2256 4224 WaterMark.exe 89 PID 4224 wrote to memory of 2256 4224 WaterMark.exe 89 PID 4224 wrote to memory of 2256 4224 WaterMark.exe 89 PID 4224 wrote to memory of 2256 4224 WaterMark.exe 89 PID 4224 wrote to memory of 2256 4224 WaterMark.exe 89 PID 4224 wrote to memory of 2256 4224 WaterMark.exe 89 PID 4224 wrote to memory of 2256 4224 WaterMark.exe 89 PID 4224 wrote to memory of 2256 4224 WaterMark.exe 89 PID 4224 wrote to memory of 3480 4224 WaterMark.exe 92 PID 4224 wrote to memory of 3480 4224 WaterMark.exe 92 PID 4224 wrote to memory of 3688 4224 WaterMark.exe 93 PID 4224 wrote to memory of 3688 4224 WaterMark.exe 93 PID 3480 wrote to memory of 4948 3480 iexplore.exe 95 PID 3480 wrote to memory of 4948 3480 iexplore.exe 95 PID 3480 wrote to memory of 4948 3480 iexplore.exe 95 PID 3688 wrote to memory of 3888 3688 iexplore.exe 94 PID 3688 wrote to memory of 3888 3688 iexplore.exe 94 PID 3688 wrote to memory of 3888 3688 iexplore.exe 94
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\769ae08e6e1189ebd0eebd460e25cc1b6ee614a119a5966d5c92ba18e6c36585.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4252 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\769ae08e6e1189ebd0eebd460e25cc1b6ee614a119a5966d5c92ba18e6c36585.dll,#12⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe5⤵PID:2256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2256 -s 2086⤵
- Program crash
PID:492
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3480 CREDAT:17410 /prefetch:26⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4948
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3688 CREDAT:17410 /prefetch:26⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3888
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1700 -s 6083⤵
- Program crash
PID:204
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 1700 -ip 17001⤵PID:4764
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2256 -ip 22561⤵PID:3832
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD594f2f6ffbba8e7644668b51b39983916
SHA163357bbdf90101969117983dbc0d4ed0e713c4d7
SHA256ede7603855cb37082c241c720a6650988c684eb3bcb263e5dd7b457458940fed
SHA512d04430ceac70c6fa71d07d9ee82ac2bb5e6c0641d5c9e7e5a3ed39d342e8b198f367676516a55f0653e0b88635a027b9ad220e223145b8be8df281bb6faf7156
-
Filesize
60KB
MD594f2f6ffbba8e7644668b51b39983916
SHA163357bbdf90101969117983dbc0d4ed0e713c4d7
SHA256ede7603855cb37082c241c720a6650988c684eb3bcb263e5dd7b457458940fed
SHA512d04430ceac70c6fa71d07d9ee82ac2bb5e6c0641d5c9e7e5a3ed39d342e8b198f367676516a55f0653e0b88635a027b9ad220e223145b8be8df281bb6faf7156
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{24313E36-7634-11ED-BF5F-D668443210E4}.dat
Filesize5KB
MD5523c9d1af22a0f68d7c0d054c32ad18c
SHA15d014fa5250cdc015971ee1db98720fa9a147be4
SHA2565e29fa30f109faad3f41b592772218848e0ad66064296bdf28e163885dbd3402
SHA5123a612d812db408a57c64ce4c74368a34b3d116b7015f8d3e1dcdea8e0fbc0eae93dad37419aa8c6ac8880f63c04954b3f5b26b55fb31d3cdcfcb41b9a70453a6
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{283273D2-7634-11ED-BF5F-D668443210E4}.dat
Filesize3KB
MD5fe51ea602ee73264795560d04eb7e760
SHA1f9538030a8a662477a0423c6bcd07442a4453cda
SHA256ee00888d50e6e07a3a94c0f1f07c98dcd612a52859309deb8f75d648f4578a82
SHA5122e9bbf599cb8a08c8afa5ed7151d524782b2aac26211fcbdedfb7ab320537ee87d26abb29125d415d131f6242fe67c4cf4e62481020c44825372efac9e6d8a88
-
Filesize
60KB
MD594f2f6ffbba8e7644668b51b39983916
SHA163357bbdf90101969117983dbc0d4ed0e713c4d7
SHA256ede7603855cb37082c241c720a6650988c684eb3bcb263e5dd7b457458940fed
SHA512d04430ceac70c6fa71d07d9ee82ac2bb5e6c0641d5c9e7e5a3ed39d342e8b198f367676516a55f0653e0b88635a027b9ad220e223145b8be8df281bb6faf7156
-
Filesize
60KB
MD594f2f6ffbba8e7644668b51b39983916
SHA163357bbdf90101969117983dbc0d4ed0e713c4d7
SHA256ede7603855cb37082c241c720a6650988c684eb3bcb263e5dd7b457458940fed
SHA512d04430ceac70c6fa71d07d9ee82ac2bb5e6c0641d5c9e7e5a3ed39d342e8b198f367676516a55f0653e0b88635a027b9ad220e223145b8be8df281bb6faf7156