Analysis
-
max time kernel
91s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 13:41
Static task
static1
Behavioral task
behavioral1
Sample
25219ad407cb26ac174799adaf6ffb23b3697c3376aa8e072b0271d5b0ab5ce5.dll
Resource
win7-20221111-en
General
-
Target
25219ad407cb26ac174799adaf6ffb23b3697c3376aa8e072b0271d5b0ab5ce5.dll
-
Size
279KB
-
MD5
69fb1b89d99533adf5313be733e69cb0
-
SHA1
0a4311679e277ca491192dc97caf1631b9742618
-
SHA256
25219ad407cb26ac174799adaf6ffb23b3697c3376aa8e072b0271d5b0ab5ce5
-
SHA512
ca4d1e7e35187d4cba6bda66cba72bb524dbf225e901dbcdd20833da96d2248c2bca4379d1ea4f87263e4b992951c2b1c31a6b7730854392a94f276828722161
-
SSDEEP
6144:ArkYHjIWeWcd71bynCoYh6ULa7U6+VSiJ:BYHjIWPo71boYs7w6GS6
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2432 rundll32mgr.exe 2052 WaterMark.exe -
resource yara_rule behavioral2/memory/2432-138-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/2432-139-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/2432-145-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/2432-144-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral2/memory/2052-147-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral2/memory/2052-150-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral2/memory/2052-154-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral2/memory/2052-155-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral2/memory/2052-158-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral2/memory/2052-159-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral2/memory/2052-160-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral2/memory/2052-161-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\WaterMark.exe rundll32mgr.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe rundll32mgr.exe File opened for modification C:\Program Files (x86)\Microsoft\pxBF1E.tmp rundll32mgr.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4268 4896 WerFault.exe 86 5116 2068 WerFault.exe 82 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3694002511" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "377383109" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31001613" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{079BEE17-7801-11ED-A0EE-C243EF799EB6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3694002511" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{079727D4-7801-11ED-A0EE-C243EF799EB6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31001613" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3703222303" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31001613" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 2052 WaterMark.exe 2052 WaterMark.exe 2052 WaterMark.exe 2052 WaterMark.exe 2052 WaterMark.exe 2052 WaterMark.exe 2052 WaterMark.exe 2052 WaterMark.exe 2052 WaterMark.exe 2052 WaterMark.exe 2052 WaterMark.exe 2052 WaterMark.exe 2052 WaterMark.exe 2052 WaterMark.exe 2052 WaterMark.exe 2052 WaterMark.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4352 iexplore.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2052 WaterMark.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4604 iexplore.exe 4352 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 4604 iexplore.exe 4604 iexplore.exe 4352 iexplore.exe 4352 iexplore.exe 4176 IEXPLORE.EXE 4176 IEXPLORE.EXE 872 IEXPLORE.EXE 872 IEXPLORE.EXE 872 IEXPLORE.EXE 872 IEXPLORE.EXE -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2432 rundll32mgr.exe 2052 WaterMark.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 4864 wrote to memory of 2068 4864 rundll32.exe 82 PID 4864 wrote to memory of 2068 4864 rundll32.exe 82 PID 4864 wrote to memory of 2068 4864 rundll32.exe 82 PID 2068 wrote to memory of 2432 2068 rundll32.exe 83 PID 2068 wrote to memory of 2432 2068 rundll32.exe 83 PID 2068 wrote to memory of 2432 2068 rundll32.exe 83 PID 2432 wrote to memory of 2052 2432 rundll32mgr.exe 85 PID 2432 wrote to memory of 2052 2432 rundll32mgr.exe 85 PID 2432 wrote to memory of 2052 2432 rundll32mgr.exe 85 PID 2052 wrote to memory of 4896 2052 WaterMark.exe 86 PID 2052 wrote to memory of 4896 2052 WaterMark.exe 86 PID 2052 wrote to memory of 4896 2052 WaterMark.exe 86 PID 2052 wrote to memory of 4896 2052 WaterMark.exe 86 PID 2052 wrote to memory of 4896 2052 WaterMark.exe 86 PID 2052 wrote to memory of 4896 2052 WaterMark.exe 86 PID 2052 wrote to memory of 4896 2052 WaterMark.exe 86 PID 2052 wrote to memory of 4896 2052 WaterMark.exe 86 PID 2052 wrote to memory of 4896 2052 WaterMark.exe 86 PID 2052 wrote to memory of 4352 2052 WaterMark.exe 90 PID 2052 wrote to memory of 4352 2052 WaterMark.exe 90 PID 2052 wrote to memory of 4604 2052 WaterMark.exe 91 PID 2052 wrote to memory of 4604 2052 WaterMark.exe 91 PID 4604 wrote to memory of 4176 4604 iexplore.exe 93 PID 4604 wrote to memory of 4176 4604 iexplore.exe 93 PID 4604 wrote to memory of 4176 4604 iexplore.exe 93 PID 4352 wrote to memory of 872 4352 iexplore.exe 92 PID 4352 wrote to memory of 872 4352 iexplore.exe 92 PID 4352 wrote to memory of 872 4352 iexplore.exe 92
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\25219ad407cb26ac174799adaf6ffb23b3697c3376aa8e072b0271d5b0ab5ce5.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\25219ad407cb26ac174799adaf6ffb23b3697c3376aa8e072b0271d5b0ab5ce5.dll,#12⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe5⤵PID:4896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4896 -s 2126⤵
- Program crash
PID:4268
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4352 CREDAT:17410 /prefetch:26⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:872
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4604 CREDAT:17410 /prefetch:26⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4176
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2068 -s 6083⤵
- Program crash
PID:5116
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2068 -ip 20681⤵PID:2960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 4896 -ip 48961⤵PID:3356
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112KB
MD5d991de961bb094d782cdba825249bb59
SHA1695b3ede0c83cfec976b10ec38606ab912a7074b
SHA2569d1853688bce399ed5ef5c8e76dd3ddffa6d15a0b29a9eb11e5746dce781fd9c
SHA51210aca884bd85145ddc64181d21eb97ce837988029261bbe04c6dd0ceb2d12c88e34bba59c80879b7be7857c10ca46478613cce10da32f86aa2e24de3192f6146
-
Filesize
112KB
MD5d991de961bb094d782cdba825249bb59
SHA1695b3ede0c83cfec976b10ec38606ab912a7074b
SHA2569d1853688bce399ed5ef5c8e76dd3ddffa6d15a0b29a9eb11e5746dce781fd9c
SHA51210aca884bd85145ddc64181d21eb97ce837988029261bbe04c6dd0ceb2d12c88e34bba59c80879b7be7857c10ca46478613cce10da32f86aa2e24de3192f6146
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD52e02780939de763a8bb3e91dfbf21980
SHA147e818dcbc1d307b43654dfe3a03b9a7625d9ce4
SHA256971abb405a443302f8c61627933bd0f46ed6953f5815e298974e6f7532908748
SHA51251709ae31e885719d848f619c4b3e732b0765a5349484f7c4ca524072a6b0d75f33d3f6c015a0ed4fd188a43d5cc9e0d221d1d7cca5a31a044b73fcbcebbe5fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize434B
MD5741481c8bb71e5e9f1978d7bb1ff5d28
SHA1ae60f289a91acb598595890d1916a6c5c1443a18
SHA256d41976c5e39043c2d93ab57a3bacc3eb1bbc08552b0e927414de4f28e457b42d
SHA51207f746cb2fddd263cc636e804a15543a5f433f124aef34b7976eb373e0c1ba61f596e6d87cc7d6640a6e2b99fd5e832e2f41a9e3fb3030bd294cb0150116498e
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{079727D4-7801-11ED-A0EE-C243EF799EB6}.dat
Filesize3KB
MD50bc509807d4c97581990f1bd7d8f9a28
SHA15dcaec15a8fc36fafaf9cb0cee19c47dee1858e5
SHA256d125ed87de13fb357db90ead2428fcdf0397ba0533bfd80590cf55e84f6e582d
SHA512a083cd22b13030f2c635b45168e441aeb71c34d7c8eea89bd8877383769954154ab457bc490cf37a822455d9f0228de0b919c3c991e9cf0d79e8fe025704c783
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{079BEE17-7801-11ED-A0EE-C243EF799EB6}.dat
Filesize5KB
MD5c388a36266b3e7f627bf1350c7cdecd0
SHA1642fe48c20a9fb3b7aa2315d00a164a15e9a298f
SHA256e47e4db2f657d48dd2296d1fd6b34d2681b334921056bcf3454c966370e1a7a2
SHA512465ebff6f23fef6ceac6b1f9161446ea89de2c9ac7be88a4c1f7b5a20cbc3a49613859d2e0ff9849b2e37f2e78e7ae289112b2b89b3f6c4b3b2f675bd164c0f8
-
Filesize
112KB
MD5d991de961bb094d782cdba825249bb59
SHA1695b3ede0c83cfec976b10ec38606ab912a7074b
SHA2569d1853688bce399ed5ef5c8e76dd3ddffa6d15a0b29a9eb11e5746dce781fd9c
SHA51210aca884bd85145ddc64181d21eb97ce837988029261bbe04c6dd0ceb2d12c88e34bba59c80879b7be7857c10ca46478613cce10da32f86aa2e24de3192f6146
-
Filesize
112KB
MD5d991de961bb094d782cdba825249bb59
SHA1695b3ede0c83cfec976b10ec38606ab912a7074b
SHA2569d1853688bce399ed5ef5c8e76dd3ddffa6d15a0b29a9eb11e5746dce781fd9c
SHA51210aca884bd85145ddc64181d21eb97ce837988029261bbe04c6dd0ceb2d12c88e34bba59c80879b7be7857c10ca46478613cce10da32f86aa2e24de3192f6146