Analysis
-
max time kernel
152s -
max time network
169s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 02:26
Static task
static1
Behavioral task
behavioral1
Sample
3496f0b95ab1e34ba50e9fd378fdf536692bd9c75d10f95e04e6deb60684e47f.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3496f0b95ab1e34ba50e9fd378fdf536692bd9c75d10f95e04e6deb60684e47f.dll
Resource
win10v2004-20221111-en
General
-
Target
3496f0b95ab1e34ba50e9fd378fdf536692bd9c75d10f95e04e6deb60684e47f.dll
-
Size
180KB
-
MD5
9c73c76055cc59b5bc931dd3d97af240
-
SHA1
8accf73064536bfc62741530e0cc39cfb2293aa6
-
SHA256
3496f0b95ab1e34ba50e9fd378fdf536692bd9c75d10f95e04e6deb60684e47f
-
SHA512
9b7ce38c429e01b06fb2ff33737ae755dd53c8dc08cc91d68f7974ff8f7c5724f630f4aaac54707535ef9297b5b37f9588b1c91cf03475cd22577432d9636a64
-
SSDEEP
3072:Yn4cV8gf2u41Z5tKlnk0cA+yJWbg5nxw64ApZb8fi:y4y8gOl2G05Ju64w8q
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,c:\\program files (x86)\\microsoft\\watermark.exe" svchost.exe -
Executes dropped EXE 2 IoCs
pid Process 1420 rundll32Srv.exe 1408 WaterMark.exe -
resource yara_rule behavioral1/files/0x00140000000054ab-56.dat upx behavioral1/files/0x00140000000054ab-59.dat upx behavioral1/files/0x00140000000054ab-57.dat upx behavioral1/files/0x00140000000054ab-60.dat upx behavioral1/files/0x0008000000013359-61.dat upx behavioral1/files/0x0008000000013359-62.dat upx behavioral1/memory/1420-65-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/files/0x0008000000013359-64.dat upx behavioral1/memory/1408-66-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/files/0x0008000000013359-67.dat upx behavioral1/memory/1408-77-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/memory/1408-195-0x0000000000400000-0x000000000045B000-memory.dmp upx -
Loads dropped DLL 4 IoCs
pid Process 1948 rundll32.exe 1948 rundll32.exe 1420 rundll32Srv.exe 1420 rundll32Srv.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32Srv.exe rundll32.exe File created C:\Windows\SysWOW64\dmlconf.dat svchost.exe File opened for modification C:\Windows\SysWOW64\dmlconf.dat svchost.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\px34A8.tmp rundll32Srv.exe File created C:\Program Files (x86)\Microsoft\WaterMark.exe rundll32Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe rundll32Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7-zip.dll svchost.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 1408 WaterMark.exe 1408 WaterMark.exe 1408 WaterMark.exe 1408 WaterMark.exe 1408 WaterMark.exe 1408 WaterMark.exe 1408 WaterMark.exe 1408 WaterMark.exe 1156 svchost.exe 1156 svchost.exe 1156 svchost.exe 1156 svchost.exe 1156 svchost.exe 1156 svchost.exe 1156 svchost.exe 1156 svchost.exe 1156 svchost.exe 1156 svchost.exe 1156 svchost.exe 1156 svchost.exe 1156 svchost.exe 1156 svchost.exe 1156 svchost.exe 1156 svchost.exe 1156 svchost.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1408 WaterMark.exe Token: SeDebugPrivilege 1156 svchost.exe Token: SeDebugPrivilege 1408 WaterMark.exe Token: SeDebugPrivilege 852 svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1952 wrote to memory of 1948 1952 rundll32.exe 28 PID 1952 wrote to memory of 1948 1952 rundll32.exe 28 PID 1952 wrote to memory of 1948 1952 rundll32.exe 28 PID 1952 wrote to memory of 1948 1952 rundll32.exe 28 PID 1952 wrote to memory of 1948 1952 rundll32.exe 28 PID 1952 wrote to memory of 1948 1952 rundll32.exe 28 PID 1952 wrote to memory of 1948 1952 rundll32.exe 28 PID 1948 wrote to memory of 1420 1948 rundll32.exe 29 PID 1948 wrote to memory of 1420 1948 rundll32.exe 29 PID 1948 wrote to memory of 1420 1948 rundll32.exe 29 PID 1948 wrote to memory of 1420 1948 rundll32.exe 29 PID 1420 wrote to memory of 1408 1420 rundll32Srv.exe 30 PID 1420 wrote to memory of 1408 1420 rundll32Srv.exe 30 PID 1420 wrote to memory of 1408 1420 rundll32Srv.exe 30 PID 1420 wrote to memory of 1408 1420 rundll32Srv.exe 30 PID 1408 wrote to memory of 852 1408 WaterMark.exe 31 PID 1408 wrote to memory of 852 1408 WaterMark.exe 31 PID 1408 wrote to memory of 852 1408 WaterMark.exe 31 PID 1408 wrote to memory of 852 1408 WaterMark.exe 31 PID 1408 wrote to memory of 852 1408 WaterMark.exe 31 PID 1408 wrote to memory of 852 1408 WaterMark.exe 31 PID 1408 wrote to memory of 852 1408 WaterMark.exe 31 PID 1408 wrote to memory of 852 1408 WaterMark.exe 31 PID 1408 wrote to memory of 852 1408 WaterMark.exe 31 PID 1408 wrote to memory of 852 1408 WaterMark.exe 31 PID 1408 wrote to memory of 1156 1408 WaterMark.exe 32 PID 1408 wrote to memory of 1156 1408 WaterMark.exe 32 PID 1408 wrote to memory of 1156 1408 WaterMark.exe 32 PID 1408 wrote to memory of 1156 1408 WaterMark.exe 32 PID 1408 wrote to memory of 1156 1408 WaterMark.exe 32 PID 1408 wrote to memory of 1156 1408 WaterMark.exe 32 PID 1408 wrote to memory of 1156 1408 WaterMark.exe 32 PID 1408 wrote to memory of 1156 1408 WaterMark.exe 32 PID 1408 wrote to memory of 1156 1408 WaterMark.exe 32 PID 1408 wrote to memory of 1156 1408 WaterMark.exe 32 PID 1156 wrote to memory of 260 1156 svchost.exe 7 PID 1156 wrote to memory of 260 1156 svchost.exe 7 PID 1156 wrote to memory of 260 1156 svchost.exe 7 PID 1156 wrote to memory of 260 1156 svchost.exe 7 PID 1156 wrote to memory of 260 1156 svchost.exe 7 PID 1156 wrote to memory of 336 1156 svchost.exe 6 PID 1156 wrote to memory of 336 1156 svchost.exe 6 PID 1156 wrote to memory of 336 1156 svchost.exe 6 PID 1156 wrote to memory of 336 1156 svchost.exe 6 PID 1156 wrote to memory of 336 1156 svchost.exe 6 PID 1156 wrote to memory of 372 1156 svchost.exe 5 PID 1156 wrote to memory of 372 1156 svchost.exe 5 PID 1156 wrote to memory of 372 1156 svchost.exe 5 PID 1156 wrote to memory of 372 1156 svchost.exe 5 PID 1156 wrote to memory of 372 1156 svchost.exe 5 PID 1156 wrote to memory of 384 1156 svchost.exe 4 PID 1156 wrote to memory of 384 1156 svchost.exe 4 PID 1156 wrote to memory of 384 1156 svchost.exe 4 PID 1156 wrote to memory of 384 1156 svchost.exe 4 PID 1156 wrote to memory of 384 1156 svchost.exe 4 PID 1156 wrote to memory of 420 1156 svchost.exe 3 PID 1156 wrote to memory of 420 1156 svchost.exe 3 PID 1156 wrote to memory of 420 1156 svchost.exe 3 PID 1156 wrote to memory of 420 1156 svchost.exe 3 PID 1156 wrote to memory of 420 1156 svchost.exe 3 PID 1156 wrote to memory of 472 1156 svchost.exe 2 PID 1156 wrote to memory of 472 1156 svchost.exe 2 PID 1156 wrote to memory of 472 1156 svchost.exe 2 PID 1156 wrote to memory of 472 1156 svchost.exe 2
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:480
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵PID:472
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵PID:744
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵PID:1772
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵PID:1032
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵PID:1120
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵PID:1076
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵PID:300
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵PID:888
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵PID:836
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵PID:804
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:760
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵PID:672
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵PID:592
-
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:420
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:384
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:372
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:488
-
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:336
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe1⤵PID:260
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe1⤵PID:2036
-
\\?\C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R1⤵PID:1992
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1196
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3496f0b95ab1e34ba50e9fd378fdf536692bd9c75d10f95e04e6deb60684e47f.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3496f0b95ab1e34ba50e9fd378fdf536692bd9c75d10f95e04e6deb60684e47f.dll,#13⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\rundll32Srv.exeC:\Windows\SysWOW64\rundll32Srv.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe6⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:852
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1156
-
-
-
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1164
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD51be1f21cd2a60ced5a3acd404a1f2ea6
SHA1fff6a565164de7098aa12ee4d45dc90b15e465a8
SHA256f35ddd14ca635ae01b84248809b5e73ba03bde56ee1b0a1595109d3e6d87f8d1
SHA5128f78a9b1a6f29e15bc729be9157bfc6f745989e27d65cd13d1ef2238b3bf58069dfbd4ba17a0cec0395ed87f98ba99bfc80f5410aa8611c2fc2861c001930ff7
-
Filesize
90KB
MD51be1f21cd2a60ced5a3acd404a1f2ea6
SHA1fff6a565164de7098aa12ee4d45dc90b15e465a8
SHA256f35ddd14ca635ae01b84248809b5e73ba03bde56ee1b0a1595109d3e6d87f8d1
SHA5128f78a9b1a6f29e15bc729be9157bfc6f745989e27d65cd13d1ef2238b3bf58069dfbd4ba17a0cec0395ed87f98ba99bfc80f5410aa8611c2fc2861c001930ff7
-
Filesize
90KB
MD51be1f21cd2a60ced5a3acd404a1f2ea6
SHA1fff6a565164de7098aa12ee4d45dc90b15e465a8
SHA256f35ddd14ca635ae01b84248809b5e73ba03bde56ee1b0a1595109d3e6d87f8d1
SHA5128f78a9b1a6f29e15bc729be9157bfc6f745989e27d65cd13d1ef2238b3bf58069dfbd4ba17a0cec0395ed87f98ba99bfc80f5410aa8611c2fc2861c001930ff7
-
Filesize
90KB
MD51be1f21cd2a60ced5a3acd404a1f2ea6
SHA1fff6a565164de7098aa12ee4d45dc90b15e465a8
SHA256f35ddd14ca635ae01b84248809b5e73ba03bde56ee1b0a1595109d3e6d87f8d1
SHA5128f78a9b1a6f29e15bc729be9157bfc6f745989e27d65cd13d1ef2238b3bf58069dfbd4ba17a0cec0395ed87f98ba99bfc80f5410aa8611c2fc2861c001930ff7
-
Filesize
90KB
MD51be1f21cd2a60ced5a3acd404a1f2ea6
SHA1fff6a565164de7098aa12ee4d45dc90b15e465a8
SHA256f35ddd14ca635ae01b84248809b5e73ba03bde56ee1b0a1595109d3e6d87f8d1
SHA5128f78a9b1a6f29e15bc729be9157bfc6f745989e27d65cd13d1ef2238b3bf58069dfbd4ba17a0cec0395ed87f98ba99bfc80f5410aa8611c2fc2861c001930ff7
-
Filesize
90KB
MD51be1f21cd2a60ced5a3acd404a1f2ea6
SHA1fff6a565164de7098aa12ee4d45dc90b15e465a8
SHA256f35ddd14ca635ae01b84248809b5e73ba03bde56ee1b0a1595109d3e6d87f8d1
SHA5128f78a9b1a6f29e15bc729be9157bfc6f745989e27d65cd13d1ef2238b3bf58069dfbd4ba17a0cec0395ed87f98ba99bfc80f5410aa8611c2fc2861c001930ff7
-
Filesize
90KB
MD51be1f21cd2a60ced5a3acd404a1f2ea6
SHA1fff6a565164de7098aa12ee4d45dc90b15e465a8
SHA256f35ddd14ca635ae01b84248809b5e73ba03bde56ee1b0a1595109d3e6d87f8d1
SHA5128f78a9b1a6f29e15bc729be9157bfc6f745989e27d65cd13d1ef2238b3bf58069dfbd4ba17a0cec0395ed87f98ba99bfc80f5410aa8611c2fc2861c001930ff7
-
Filesize
90KB
MD51be1f21cd2a60ced5a3acd404a1f2ea6
SHA1fff6a565164de7098aa12ee4d45dc90b15e465a8
SHA256f35ddd14ca635ae01b84248809b5e73ba03bde56ee1b0a1595109d3e6d87f8d1
SHA5128f78a9b1a6f29e15bc729be9157bfc6f745989e27d65cd13d1ef2238b3bf58069dfbd4ba17a0cec0395ed87f98ba99bfc80f5410aa8611c2fc2861c001930ff7