Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 02:12
Static task
static1
Behavioral task
behavioral1
Sample
7688f4f49dbbae8587b13c38a200ddd24ed6d7bf94c0165de32ef53ff9d4248f.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7688f4f49dbbae8587b13c38a200ddd24ed6d7bf94c0165de32ef53ff9d4248f.dll
Resource
win10v2004-20221111-en
General
-
Target
7688f4f49dbbae8587b13c38a200ddd24ed6d7bf94c0165de32ef53ff9d4248f.dll
-
Size
456KB
-
MD5
eabcbe44552f06b0dd0a4514a9b68ba0
-
SHA1
13ed72f80bc74f379dff4b69be1ecf4c9b265253
-
SHA256
7688f4f49dbbae8587b13c38a200ddd24ed6d7bf94c0165de32ef53ff9d4248f
-
SHA512
f6fe5aa3bde9807c030d7309662712fc3bc61363f962f5395ead97dece662f3066e53aa1010c403547f49f62b5f8f7fa8ad4c6b779ebfcfac00d17986b494b27
-
SSDEEP
12288:EehnaNPpSVZmNxRCwnwm3W3OHIIf53VdH/w:Eeh0PpS6NxNnwYeOHX3d4
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,c:\\program files (x86)\\microsoft\\watermark.exe" svchost.exe -
Executes dropped EXE 2 IoCs
pid Process 940 rundll32Srv.exe 824 WaterMark.exe -
resource yara_rule behavioral1/files/0x0007000000005c50-56.dat upx behavioral1/files/0x0007000000005c50-57.dat upx behavioral1/files/0x0007000000005c50-59.dat upx behavioral1/memory/940-64-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/files/0x0007000000005c50-65.dat upx behavioral1/files/0x000b000000012353-66.dat upx behavioral1/files/0x000b000000012353-67.dat upx behavioral1/files/0x000b000000012353-69.dat upx behavioral1/memory/940-70-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/files/0x000b000000012353-71.dat upx behavioral1/memory/824-81-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/memory/824-211-0x0000000000400000-0x0000000000454000-memory.dmp upx -
Loads dropped DLL 4 IoCs
pid Process 1364 rundll32.exe 1364 rundll32.exe 940 rundll32Srv.exe 940 rundll32Srv.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\dmlconf.dat svchost.exe File created C:\Windows\SysWOW64\rundll32Srv.exe rundll32.exe File created C:\Windows\SysWOW64\dmlconf.dat svchost.exe -
Drops file in Program Files directory 10 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\px4599.tmp rundll32Srv.exe File created C:\Program Files (x86)\Microsoft\WaterMark.exe rundll32Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe rundll32Srv.exe File opened for modification C:\Program Files\7-Zip\7-zip.dll svchost.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7-zip32.dll svchost.exe File opened for modification C:\Program Files\7-Zip\7z.dll svchost.exe File opened for modification C:\Program Files\7-Zip\7z.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7zG.exe svchost.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 948 1364 WerFault.exe 27 -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 824 WaterMark.exe 824 WaterMark.exe 824 WaterMark.exe 824 WaterMark.exe 824 WaterMark.exe 824 WaterMark.exe 824 WaterMark.exe 824 WaterMark.exe 1796 svchost.exe 1796 svchost.exe 1796 svchost.exe 1796 svchost.exe 1796 svchost.exe 1796 svchost.exe 1796 svchost.exe 1796 svchost.exe 1796 svchost.exe 1796 svchost.exe 1796 svchost.exe 1796 svchost.exe 1796 svchost.exe 1796 svchost.exe 1796 svchost.exe 1796 svchost.exe 1796 svchost.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 824 WaterMark.exe Token: SeDebugPrivilege 1796 svchost.exe Token: SeDebugPrivilege 1364 rundll32.exe Token: SeDebugPrivilege 948 WerFault.exe Token: SeDebugPrivilege 824 WaterMark.exe Token: SeDebugPrivilege 1048 svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 904 wrote to memory of 1364 904 rundll32.exe 27 PID 904 wrote to memory of 1364 904 rundll32.exe 27 PID 904 wrote to memory of 1364 904 rundll32.exe 27 PID 904 wrote to memory of 1364 904 rundll32.exe 27 PID 904 wrote to memory of 1364 904 rundll32.exe 27 PID 904 wrote to memory of 1364 904 rundll32.exe 27 PID 904 wrote to memory of 1364 904 rundll32.exe 27 PID 1364 wrote to memory of 940 1364 rundll32.exe 28 PID 1364 wrote to memory of 940 1364 rundll32.exe 28 PID 1364 wrote to memory of 940 1364 rundll32.exe 28 PID 1364 wrote to memory of 940 1364 rundll32.exe 28 PID 1364 wrote to memory of 948 1364 rundll32.exe 29 PID 1364 wrote to memory of 948 1364 rundll32.exe 29 PID 1364 wrote to memory of 948 1364 rundll32.exe 29 PID 1364 wrote to memory of 948 1364 rundll32.exe 29 PID 940 wrote to memory of 824 940 rundll32Srv.exe 30 PID 940 wrote to memory of 824 940 rundll32Srv.exe 30 PID 940 wrote to memory of 824 940 rundll32Srv.exe 30 PID 940 wrote to memory of 824 940 rundll32Srv.exe 30 PID 824 wrote to memory of 1048 824 WaterMark.exe 31 PID 824 wrote to memory of 1048 824 WaterMark.exe 31 PID 824 wrote to memory of 1048 824 WaterMark.exe 31 PID 824 wrote to memory of 1048 824 WaterMark.exe 31 PID 824 wrote to memory of 1048 824 WaterMark.exe 31 PID 824 wrote to memory of 1048 824 WaterMark.exe 31 PID 824 wrote to memory of 1048 824 WaterMark.exe 31 PID 824 wrote to memory of 1048 824 WaterMark.exe 31 PID 824 wrote to memory of 1048 824 WaterMark.exe 31 PID 824 wrote to memory of 1048 824 WaterMark.exe 31 PID 824 wrote to memory of 1796 824 WaterMark.exe 32 PID 824 wrote to memory of 1796 824 WaterMark.exe 32 PID 824 wrote to memory of 1796 824 WaterMark.exe 32 PID 824 wrote to memory of 1796 824 WaterMark.exe 32 PID 824 wrote to memory of 1796 824 WaterMark.exe 32 PID 824 wrote to memory of 1796 824 WaterMark.exe 32 PID 824 wrote to memory of 1796 824 WaterMark.exe 32 PID 824 wrote to memory of 1796 824 WaterMark.exe 32 PID 824 wrote to memory of 1796 824 WaterMark.exe 32 PID 824 wrote to memory of 1796 824 WaterMark.exe 32 PID 1796 wrote to memory of 260 1796 svchost.exe 22 PID 1796 wrote to memory of 260 1796 svchost.exe 22 PID 1796 wrote to memory of 260 1796 svchost.exe 22 PID 1796 wrote to memory of 260 1796 svchost.exe 22 PID 1796 wrote to memory of 260 1796 svchost.exe 22 PID 1796 wrote to memory of 332 1796 svchost.exe 21 PID 1796 wrote to memory of 332 1796 svchost.exe 21 PID 1796 wrote to memory of 332 1796 svchost.exe 21 PID 1796 wrote to memory of 332 1796 svchost.exe 21 PID 1796 wrote to memory of 332 1796 svchost.exe 21 PID 1796 wrote to memory of 368 1796 svchost.exe 20 PID 1796 wrote to memory of 368 1796 svchost.exe 20 PID 1796 wrote to memory of 368 1796 svchost.exe 20 PID 1796 wrote to memory of 368 1796 svchost.exe 20 PID 1796 wrote to memory of 368 1796 svchost.exe 20 PID 1796 wrote to memory of 380 1796 svchost.exe 19 PID 1796 wrote to memory of 380 1796 svchost.exe 19 PID 1796 wrote to memory of 380 1796 svchost.exe 19 PID 1796 wrote to memory of 380 1796 svchost.exe 19 PID 1796 wrote to memory of 380 1796 svchost.exe 19 PID 1796 wrote to memory of 420 1796 svchost.exe 3 PID 1796 wrote to memory of 420 1796 svchost.exe 3 PID 1796 wrote to memory of 420 1796 svchost.exe 3 PID 1796 wrote to memory of 420 1796 svchost.exe 3 PID 1796 wrote to memory of 420 1796 svchost.exe 3
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:480
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵PID:464
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵PID:872
-
\\?\C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R3⤵PID:1764
-
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵PID:1260
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵PID:1028
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵PID:272
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵PID:292
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵PID:832
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵PID:796
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:740
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵PID:664
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵PID:1804
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵PID:588
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵PID:680
-
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:420
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe1⤵PID:488
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1424
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7688f4f49dbbae8587b13c38a200ddd24ed6d7bf94c0165de32ef53ff9d4248f.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7688f4f49dbbae8587b13c38a200ddd24ed6d7bf94c0165de32ef53ff9d4248f.dll,#13⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\SysWOW64\rundll32Srv.exeC:\Windows\SysWOW64\rundll32Srv.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe6⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:1048
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1796
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1364 -s 2284⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:948
-
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1396
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:380
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:368
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:332
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe1⤵PID:260
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD54fce3dca76aa1257e929fa4574001c7b
SHA19f66b7373542d2eadfdf0b2deefdde1b5a75961d
SHA2560d9a606625cd68b736457065e54dc2ab0c620bca5195820bdc146c3dafed7fe8
SHA512f3546641357ecaf22538fd940ac68f7d4479a04d4783e4cbc9df61b62399185ff266ebb4049d1a9ca6acbc5baca7ec030713543d55c599a03f5c1c8309028cdb
-
Filesize
73KB
MD54fce3dca76aa1257e929fa4574001c7b
SHA19f66b7373542d2eadfdf0b2deefdde1b5a75961d
SHA2560d9a606625cd68b736457065e54dc2ab0c620bca5195820bdc146c3dafed7fe8
SHA512f3546641357ecaf22538fd940ac68f7d4479a04d4783e4cbc9df61b62399185ff266ebb4049d1a9ca6acbc5baca7ec030713543d55c599a03f5c1c8309028cdb
-
Filesize
73KB
MD54fce3dca76aa1257e929fa4574001c7b
SHA19f66b7373542d2eadfdf0b2deefdde1b5a75961d
SHA2560d9a606625cd68b736457065e54dc2ab0c620bca5195820bdc146c3dafed7fe8
SHA512f3546641357ecaf22538fd940ac68f7d4479a04d4783e4cbc9df61b62399185ff266ebb4049d1a9ca6acbc5baca7ec030713543d55c599a03f5c1c8309028cdb
-
Filesize
73KB
MD54fce3dca76aa1257e929fa4574001c7b
SHA19f66b7373542d2eadfdf0b2deefdde1b5a75961d
SHA2560d9a606625cd68b736457065e54dc2ab0c620bca5195820bdc146c3dafed7fe8
SHA512f3546641357ecaf22538fd940ac68f7d4479a04d4783e4cbc9df61b62399185ff266ebb4049d1a9ca6acbc5baca7ec030713543d55c599a03f5c1c8309028cdb
-
Filesize
73KB
MD54fce3dca76aa1257e929fa4574001c7b
SHA19f66b7373542d2eadfdf0b2deefdde1b5a75961d
SHA2560d9a606625cd68b736457065e54dc2ab0c620bca5195820bdc146c3dafed7fe8
SHA512f3546641357ecaf22538fd940ac68f7d4479a04d4783e4cbc9df61b62399185ff266ebb4049d1a9ca6acbc5baca7ec030713543d55c599a03f5c1c8309028cdb
-
Filesize
73KB
MD54fce3dca76aa1257e929fa4574001c7b
SHA19f66b7373542d2eadfdf0b2deefdde1b5a75961d
SHA2560d9a606625cd68b736457065e54dc2ab0c620bca5195820bdc146c3dafed7fe8
SHA512f3546641357ecaf22538fd940ac68f7d4479a04d4783e4cbc9df61b62399185ff266ebb4049d1a9ca6acbc5baca7ec030713543d55c599a03f5c1c8309028cdb
-
Filesize
73KB
MD54fce3dca76aa1257e929fa4574001c7b
SHA19f66b7373542d2eadfdf0b2deefdde1b5a75961d
SHA2560d9a606625cd68b736457065e54dc2ab0c620bca5195820bdc146c3dafed7fe8
SHA512f3546641357ecaf22538fd940ac68f7d4479a04d4783e4cbc9df61b62399185ff266ebb4049d1a9ca6acbc5baca7ec030713543d55c599a03f5c1c8309028cdb
-
Filesize
73KB
MD54fce3dca76aa1257e929fa4574001c7b
SHA19f66b7373542d2eadfdf0b2deefdde1b5a75961d
SHA2560d9a606625cd68b736457065e54dc2ab0c620bca5195820bdc146c3dafed7fe8
SHA512f3546641357ecaf22538fd940ac68f7d4479a04d4783e4cbc9df61b62399185ff266ebb4049d1a9ca6acbc5baca7ec030713543d55c599a03f5c1c8309028cdb