Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 02:14
Static task
static1
Behavioral task
behavioral1
Sample
6f852393f04fc33bc333c65f4e48721323675d8781b253f31e8dfb3bcf8248ae.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6f852393f04fc33bc333c65f4e48721323675d8781b253f31e8dfb3bcf8248ae.dll
Resource
win10v2004-20220812-en
General
-
Target
6f852393f04fc33bc333c65f4e48721323675d8781b253f31e8dfb3bcf8248ae.dll
-
Size
472KB
-
MD5
e0c9cb9c18f7d70d93f8cdbd74aca8f0
-
SHA1
ab75ec6d2eb52bcc96a417a1016a1d23f9646727
-
SHA256
6f852393f04fc33bc333c65f4e48721323675d8781b253f31e8dfb3bcf8248ae
-
SHA512
9682db021de10265efecdf376950391f5ac09016dc5d9792339355feed67044e1d4e7028e42909f34d1b0552b82260ce105e5cb7c5af9aabd591e03d1b5bdaa2
-
SSDEEP
12288:WehnaNPpSVZmNxRCwnwm3W3OHIIf5yC1l4:Weh0PpS6NxNnwYeOHX0C1l
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,c:\\program files (x86)\\microsoft\\watermark.exe" svchost.exe -
Executes dropped EXE 2 IoCs
pid Process 1948 rundll32Srv.exe 1128 WaterMark.exe -
resource yara_rule behavioral1/files/0x0007000000005c50-56.dat upx behavioral1/memory/1172-58-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/files/0x0007000000005c50-59.dat upx behavioral1/files/0x0007000000005c50-61.dat upx behavioral1/files/0x0007000000005c50-63.dat upx behavioral1/files/0x000b0000000122ce-64.dat upx behavioral1/files/0x000b0000000122ce-65.dat upx behavioral1/files/0x000b0000000122ce-67.dat upx behavioral1/memory/1948-68-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/1128-70-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/files/0x000b0000000122ce-71.dat upx behavioral1/memory/1128-81-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/1128-207-0x0000000000400000-0x000000000045B000-memory.dmp upx -
Loads dropped DLL 4 IoCs
pid Process 1172 rundll32.exe 1172 rundll32.exe 1948 rundll32Srv.exe 1948 rundll32Srv.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\dmlconf.dat svchost.exe File opened for modification C:\Windows\SysWOW64\dmlconf.dat svchost.exe File created C:\Windows\SysWOW64\rundll32Srv.exe rundll32.exe -
Drops file in Program Files directory 10 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\7z.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7zG.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\px4D95.tmp rundll32Srv.exe File created C:\Program Files (x86)\Microsoft\WaterMark.exe rundll32Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7-zip32.dll svchost.exe File opened for modification C:\Program Files\7-Zip\7z.dll svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe rundll32Srv.exe File opened for modification C:\Program Files\7-Zip\7-zip.dll svchost.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1940 1172 WerFault.exe 26 -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 1128 WaterMark.exe 1128 WaterMark.exe 1128 WaterMark.exe 1128 WaterMark.exe 1128 WaterMark.exe 1128 WaterMark.exe 1128 WaterMark.exe 1128 WaterMark.exe 1640 svchost.exe 1640 svchost.exe 1640 svchost.exe 1640 svchost.exe 1640 svchost.exe 1640 svchost.exe 1640 svchost.exe 1640 svchost.exe 1640 svchost.exe 1640 svchost.exe 1640 svchost.exe 1640 svchost.exe 1640 svchost.exe 1640 svchost.exe 1640 svchost.exe 1640 svchost.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1128 WaterMark.exe Token: SeDebugPrivilege 1640 svchost.exe Token: SeDebugPrivilege 1172 rundll32.exe Token: SeDebugPrivilege 1940 WerFault.exe Token: SeDebugPrivilege 1128 WaterMark.exe Token: SeDebugPrivilege 1108 svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1584 wrote to memory of 1172 1584 rundll32.exe 26 PID 1584 wrote to memory of 1172 1584 rundll32.exe 26 PID 1584 wrote to memory of 1172 1584 rundll32.exe 26 PID 1584 wrote to memory of 1172 1584 rundll32.exe 26 PID 1584 wrote to memory of 1172 1584 rundll32.exe 26 PID 1584 wrote to memory of 1172 1584 rundll32.exe 26 PID 1584 wrote to memory of 1172 1584 rundll32.exe 26 PID 1172 wrote to memory of 1948 1172 rundll32.exe 27 PID 1172 wrote to memory of 1948 1172 rundll32.exe 27 PID 1172 wrote to memory of 1948 1172 rundll32.exe 27 PID 1172 wrote to memory of 1948 1172 rundll32.exe 27 PID 1172 wrote to memory of 1940 1172 rundll32.exe 28 PID 1172 wrote to memory of 1940 1172 rundll32.exe 28 PID 1172 wrote to memory of 1940 1172 rundll32.exe 28 PID 1172 wrote to memory of 1940 1172 rundll32.exe 28 PID 1948 wrote to memory of 1128 1948 rundll32Srv.exe 29 PID 1948 wrote to memory of 1128 1948 rundll32Srv.exe 29 PID 1948 wrote to memory of 1128 1948 rundll32Srv.exe 29 PID 1948 wrote to memory of 1128 1948 rundll32Srv.exe 29 PID 1128 wrote to memory of 1108 1128 WaterMark.exe 30 PID 1128 wrote to memory of 1108 1128 WaterMark.exe 30 PID 1128 wrote to memory of 1108 1128 WaterMark.exe 30 PID 1128 wrote to memory of 1108 1128 WaterMark.exe 30 PID 1128 wrote to memory of 1108 1128 WaterMark.exe 30 PID 1128 wrote to memory of 1108 1128 WaterMark.exe 30 PID 1128 wrote to memory of 1108 1128 WaterMark.exe 30 PID 1128 wrote to memory of 1108 1128 WaterMark.exe 30 PID 1128 wrote to memory of 1108 1128 WaterMark.exe 30 PID 1128 wrote to memory of 1108 1128 WaterMark.exe 30 PID 1128 wrote to memory of 1640 1128 WaterMark.exe 31 PID 1128 wrote to memory of 1640 1128 WaterMark.exe 31 PID 1128 wrote to memory of 1640 1128 WaterMark.exe 31 PID 1128 wrote to memory of 1640 1128 WaterMark.exe 31 PID 1128 wrote to memory of 1640 1128 WaterMark.exe 31 PID 1128 wrote to memory of 1640 1128 WaterMark.exe 31 PID 1128 wrote to memory of 1640 1128 WaterMark.exe 31 PID 1128 wrote to memory of 1640 1128 WaterMark.exe 31 PID 1128 wrote to memory of 1640 1128 WaterMark.exe 31 PID 1128 wrote to memory of 1640 1128 WaterMark.exe 31 PID 1640 wrote to memory of 260 1640 svchost.exe 7 PID 1640 wrote to memory of 260 1640 svchost.exe 7 PID 1640 wrote to memory of 260 1640 svchost.exe 7 PID 1640 wrote to memory of 260 1640 svchost.exe 7 PID 1640 wrote to memory of 260 1640 svchost.exe 7 PID 1640 wrote to memory of 332 1640 svchost.exe 6 PID 1640 wrote to memory of 332 1640 svchost.exe 6 PID 1640 wrote to memory of 332 1640 svchost.exe 6 PID 1640 wrote to memory of 332 1640 svchost.exe 6 PID 1640 wrote to memory of 332 1640 svchost.exe 6 PID 1640 wrote to memory of 368 1640 svchost.exe 5 PID 1640 wrote to memory of 368 1640 svchost.exe 5 PID 1640 wrote to memory of 368 1640 svchost.exe 5 PID 1640 wrote to memory of 368 1640 svchost.exe 5 PID 1640 wrote to memory of 368 1640 svchost.exe 5 PID 1640 wrote to memory of 376 1640 svchost.exe 4 PID 1640 wrote to memory of 376 1640 svchost.exe 4 PID 1640 wrote to memory of 376 1640 svchost.exe 4 PID 1640 wrote to memory of 376 1640 svchost.exe 4 PID 1640 wrote to memory of 376 1640 svchost.exe 4 PID 1640 wrote to memory of 416 1640 svchost.exe 3 PID 1640 wrote to memory of 416 1640 svchost.exe 3 PID 1640 wrote to memory of 416 1640 svchost.exe 3 PID 1640 wrote to memory of 416 1640 svchost.exe 3 PID 1640 wrote to memory of 416 1640 svchost.exe 3
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:476
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵PID:460
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵PID:872
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵PID:300
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵PID:1256
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵PID:1756
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵PID:1812
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵PID:1036
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵PID:328
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵PID:832
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵PID:804
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:732
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵PID:664
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵PID:584
-
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:416
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:376
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:368
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:484
-
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:332
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe1⤵PID:260
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1412
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6f852393f04fc33bc333c65f4e48721323675d8781b253f31e8dfb3bcf8248ae.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6f852393f04fc33bc333c65f4e48721323675d8781b253f31e8dfb3bcf8248ae.dll,#13⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Windows\SysWOW64\rundll32Srv.exeC:\Windows\SysWOW64\rundll32Srv.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe6⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:1108
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1640
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1172 -s 2284⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:1940
-
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1340
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD591b07c6f70654a26ca1cd8cde6fb2a7e
SHA1789629859ed76191432fd7ab40cfa0487b580a6e
SHA25637417b870c644d70c09c773b828dbb451e33d4e74df2f66d9698ae090d240d15
SHA512077b62709e40c66304429acae5cccb953affa59791f2139d0b0e3e8a4610d38aa5dd6a44d9c857220245a9e746fb980a5dd0966d8b2795313ca7b6deeafd1dd2
-
Filesize
90KB
MD591b07c6f70654a26ca1cd8cde6fb2a7e
SHA1789629859ed76191432fd7ab40cfa0487b580a6e
SHA25637417b870c644d70c09c773b828dbb451e33d4e74df2f66d9698ae090d240d15
SHA512077b62709e40c66304429acae5cccb953affa59791f2139d0b0e3e8a4610d38aa5dd6a44d9c857220245a9e746fb980a5dd0966d8b2795313ca7b6deeafd1dd2
-
Filesize
90KB
MD591b07c6f70654a26ca1cd8cde6fb2a7e
SHA1789629859ed76191432fd7ab40cfa0487b580a6e
SHA25637417b870c644d70c09c773b828dbb451e33d4e74df2f66d9698ae090d240d15
SHA512077b62709e40c66304429acae5cccb953affa59791f2139d0b0e3e8a4610d38aa5dd6a44d9c857220245a9e746fb980a5dd0966d8b2795313ca7b6deeafd1dd2
-
Filesize
90KB
MD591b07c6f70654a26ca1cd8cde6fb2a7e
SHA1789629859ed76191432fd7ab40cfa0487b580a6e
SHA25637417b870c644d70c09c773b828dbb451e33d4e74df2f66d9698ae090d240d15
SHA512077b62709e40c66304429acae5cccb953affa59791f2139d0b0e3e8a4610d38aa5dd6a44d9c857220245a9e746fb980a5dd0966d8b2795313ca7b6deeafd1dd2
-
Filesize
90KB
MD591b07c6f70654a26ca1cd8cde6fb2a7e
SHA1789629859ed76191432fd7ab40cfa0487b580a6e
SHA25637417b870c644d70c09c773b828dbb451e33d4e74df2f66d9698ae090d240d15
SHA512077b62709e40c66304429acae5cccb953affa59791f2139d0b0e3e8a4610d38aa5dd6a44d9c857220245a9e746fb980a5dd0966d8b2795313ca7b6deeafd1dd2
-
Filesize
90KB
MD591b07c6f70654a26ca1cd8cde6fb2a7e
SHA1789629859ed76191432fd7ab40cfa0487b580a6e
SHA25637417b870c644d70c09c773b828dbb451e33d4e74df2f66d9698ae090d240d15
SHA512077b62709e40c66304429acae5cccb953affa59791f2139d0b0e3e8a4610d38aa5dd6a44d9c857220245a9e746fb980a5dd0966d8b2795313ca7b6deeafd1dd2
-
Filesize
90KB
MD591b07c6f70654a26ca1cd8cde6fb2a7e
SHA1789629859ed76191432fd7ab40cfa0487b580a6e
SHA25637417b870c644d70c09c773b828dbb451e33d4e74df2f66d9698ae090d240d15
SHA512077b62709e40c66304429acae5cccb953affa59791f2139d0b0e3e8a4610d38aa5dd6a44d9c857220245a9e746fb980a5dd0966d8b2795313ca7b6deeafd1dd2
-
Filesize
90KB
MD591b07c6f70654a26ca1cd8cde6fb2a7e
SHA1789629859ed76191432fd7ab40cfa0487b580a6e
SHA25637417b870c644d70c09c773b828dbb451e33d4e74df2f66d9698ae090d240d15
SHA512077b62709e40c66304429acae5cccb953affa59791f2139d0b0e3e8a4610d38aa5dd6a44d9c857220245a9e746fb980a5dd0966d8b2795313ca7b6deeafd1dd2