Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
29-01-2023 22:55
Static task
static1
Behavioral task
behavioral1
Sample
9124e6062db2c318517de2d45158e3f7e580e20884d80ee03625861f830f94fa.exe
Resource
win7-20220901-en
General
-
Target
9124e6062db2c318517de2d45158e3f7e580e20884d80ee03625861f830f94fa.exe
-
Size
121KB
-
MD5
2299a2d6f8d62723d3d76cac0bc2c01b
-
SHA1
a2c396aa7d073b50ddc96a9996eef8f47cb9b04b
-
SHA256
9124e6062db2c318517de2d45158e3f7e580e20884d80ee03625861f830f94fa
-
SHA512
2bc19355cc23cfa3c43e629d39742a8ceb75bec402202cbaaea78e39f452da250296628c0f35ff043047458275eaaca4f9b04768754f4ce475d92b4c32521a95
-
SSDEEP
1536:N8kwilTEhU4HDa1KkjWXUa21mc/Mue9VR:dhlohUEK9ekp6
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,c:\\program files (x86)\\microsoft\\watermark.exe" svchost.exe -
Executes dropped EXE 1 IoCs
Processes:
WaterMark.exepid process 1932 WaterMark.exe -
Processes:
resource yara_rule behavioral1/memory/1500-57-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1932-70-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1932-178-0x0000000000400000-0x0000000000427000-memory.dmp upx -
Loads dropped DLL 2 IoCs
Processes:
9124e6062db2c318517de2d45158e3f7e580e20884d80ee03625861f830f94fa.exepid process 1500 9124e6062db2c318517de2d45158e3f7e580e20884d80ee03625861f830f94fa.exe 1500 9124e6062db2c318517de2d45158e3f7e580e20884d80ee03625861f830f94fa.exe -
Drops file in System32 directory 2 IoCs
Processes:
svchost.exedescription ioc process File created C:\Windows\SysWOW64\dmlconf.dat svchost.exe File opened for modification C:\Windows\SysWOW64\dmlconf.dat svchost.exe -
Drops file in Program Files directory 10 IoCs
Processes:
9124e6062db2c318517de2d45158e3f7e580e20884d80ee03625861f830f94fa.exesvchost.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft\pxF835.tmp 9124e6062db2c318517de2d45158e3f7e580e20884d80ee03625861f830f94fa.exe File created C:\Program Files (x86)\Microsoft\WaterMark.exe 9124e6062db2c318517de2d45158e3f7e580e20884d80ee03625861f830f94fa.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe 9124e6062db2c318517de2d45158e3f7e580e20884d80ee03625861f830f94fa.exe File opened for modification C:\Program Files\7-Zip\7z.dll svchost.exe File opened for modification C:\Program Files\7-Zip\7z.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7-zip.dll svchost.exe File opened for modification C:\Program Files\7-Zip\7-zip32.dll svchost.exe File opened for modification C:\Program Files\7-Zip\7zG.exe svchost.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
Processes:
WaterMark.exesvchost.exepid process 1932 WaterMark.exe 1932 WaterMark.exe 1932 WaterMark.exe 1932 WaterMark.exe 1932 WaterMark.exe 1932 WaterMark.exe 1932 WaterMark.exe 1932 WaterMark.exe 820 svchost.exe 820 svchost.exe 820 svchost.exe 820 svchost.exe 820 svchost.exe 820 svchost.exe 820 svchost.exe 820 svchost.exe 820 svchost.exe 820 svchost.exe 820 svchost.exe 820 svchost.exe 820 svchost.exe 820 svchost.exe 820 svchost.exe 820 svchost.exe 820 svchost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WaterMark.exesvchost.exedescription pid process Token: SeDebugPrivilege 1932 WaterMark.exe Token: SeDebugPrivilege 820 svchost.exe Token: SeDebugPrivilege 1932 WaterMark.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
9124e6062db2c318517de2d45158e3f7e580e20884d80ee03625861f830f94fa.exeWaterMark.exesvchost.exedescription pid process target process PID 1500 wrote to memory of 1932 1500 9124e6062db2c318517de2d45158e3f7e580e20884d80ee03625861f830f94fa.exe WaterMark.exe PID 1500 wrote to memory of 1932 1500 9124e6062db2c318517de2d45158e3f7e580e20884d80ee03625861f830f94fa.exe WaterMark.exe PID 1500 wrote to memory of 1932 1500 9124e6062db2c318517de2d45158e3f7e580e20884d80ee03625861f830f94fa.exe WaterMark.exe PID 1500 wrote to memory of 1932 1500 9124e6062db2c318517de2d45158e3f7e580e20884d80ee03625861f830f94fa.exe WaterMark.exe PID 1932 wrote to memory of 676 1932 WaterMark.exe svchost.exe PID 1932 wrote to memory of 676 1932 WaterMark.exe svchost.exe PID 1932 wrote to memory of 676 1932 WaterMark.exe svchost.exe PID 1932 wrote to memory of 676 1932 WaterMark.exe svchost.exe PID 1932 wrote to memory of 676 1932 WaterMark.exe svchost.exe PID 1932 wrote to memory of 676 1932 WaterMark.exe svchost.exe PID 1932 wrote to memory of 676 1932 WaterMark.exe svchost.exe PID 1932 wrote to memory of 676 1932 WaterMark.exe svchost.exe PID 1932 wrote to memory of 676 1932 WaterMark.exe svchost.exe PID 1932 wrote to memory of 676 1932 WaterMark.exe svchost.exe PID 1932 wrote to memory of 820 1932 WaterMark.exe svchost.exe PID 1932 wrote to memory of 820 1932 WaterMark.exe svchost.exe PID 1932 wrote to memory of 820 1932 WaterMark.exe svchost.exe PID 1932 wrote to memory of 820 1932 WaterMark.exe svchost.exe PID 1932 wrote to memory of 820 1932 WaterMark.exe svchost.exe PID 1932 wrote to memory of 820 1932 WaterMark.exe svchost.exe PID 1932 wrote to memory of 820 1932 WaterMark.exe svchost.exe PID 1932 wrote to memory of 820 1932 WaterMark.exe svchost.exe PID 1932 wrote to memory of 820 1932 WaterMark.exe svchost.exe PID 1932 wrote to memory of 820 1932 WaterMark.exe svchost.exe PID 820 wrote to memory of 260 820 svchost.exe smss.exe PID 820 wrote to memory of 260 820 svchost.exe smss.exe PID 820 wrote to memory of 260 820 svchost.exe smss.exe PID 820 wrote to memory of 260 820 svchost.exe smss.exe PID 820 wrote to memory of 260 820 svchost.exe smss.exe PID 820 wrote to memory of 332 820 svchost.exe csrss.exe PID 820 wrote to memory of 332 820 svchost.exe csrss.exe PID 820 wrote to memory of 332 820 svchost.exe csrss.exe PID 820 wrote to memory of 332 820 svchost.exe csrss.exe PID 820 wrote to memory of 332 820 svchost.exe csrss.exe PID 820 wrote to memory of 368 820 svchost.exe wininit.exe PID 820 wrote to memory of 368 820 svchost.exe wininit.exe PID 820 wrote to memory of 368 820 svchost.exe wininit.exe PID 820 wrote to memory of 368 820 svchost.exe wininit.exe PID 820 wrote to memory of 368 820 svchost.exe wininit.exe PID 820 wrote to memory of 380 820 svchost.exe csrss.exe PID 820 wrote to memory of 380 820 svchost.exe csrss.exe PID 820 wrote to memory of 380 820 svchost.exe csrss.exe PID 820 wrote to memory of 380 820 svchost.exe csrss.exe PID 820 wrote to memory of 380 820 svchost.exe csrss.exe PID 820 wrote to memory of 416 820 svchost.exe winlogon.exe PID 820 wrote to memory of 416 820 svchost.exe winlogon.exe PID 820 wrote to memory of 416 820 svchost.exe winlogon.exe PID 820 wrote to memory of 416 820 svchost.exe winlogon.exe PID 820 wrote to memory of 416 820 svchost.exe winlogon.exe PID 820 wrote to memory of 464 820 svchost.exe services.exe PID 820 wrote to memory of 464 820 svchost.exe services.exe PID 820 wrote to memory of 464 820 svchost.exe services.exe PID 820 wrote to memory of 464 820 svchost.exe services.exe PID 820 wrote to memory of 464 820 svchost.exe services.exe PID 820 wrote to memory of 472 820 svchost.exe lsass.exe PID 820 wrote to memory of 472 820 svchost.exe lsass.exe PID 820 wrote to memory of 472 820 svchost.exe lsass.exe PID 820 wrote to memory of 472 820 svchost.exe lsass.exe PID 820 wrote to memory of 472 820 svchost.exe lsass.exe PID 820 wrote to memory of 480 820 svchost.exe lsm.exe PID 820 wrote to memory of 480 820 svchost.exe lsm.exe PID 820 wrote to memory of 480 820 svchost.exe lsm.exe PID 820 wrote to memory of 480 820 svchost.exe lsm.exe PID 820 wrote to memory of 480 820 svchost.exe lsm.exe
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵
-
C:\Windows\system32\wininit.exewininit.exe1⤵
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\9124e6062db2c318517de2d45158e3f7e580e20884d80ee03625861f830f94fa.exe"C:\Users\Admin\AppData\Local\Temp\9124e6062db2c318517de2d45158e3f7e580e20884d80ee03625861f830f94fa.exe"2⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe4⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Drops file in Program Files directory
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
\\?\C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R1⤵
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Microsoft\WaterMark.exeFilesize
121KB
MD52299a2d6f8d62723d3d76cac0bc2c01b
SHA1a2c396aa7d073b50ddc96a9996eef8f47cb9b04b
SHA2569124e6062db2c318517de2d45158e3f7e580e20884d80ee03625861f830f94fa
SHA5122bc19355cc23cfa3c43e629d39742a8ceb75bec402202cbaaea78e39f452da250296628c0f35ff043047458275eaaca4f9b04768754f4ce475d92b4c32521a95
-
C:\Program Files (x86)\Microsoft\WaterMark.exeFilesize
121KB
MD52299a2d6f8d62723d3d76cac0bc2c01b
SHA1a2c396aa7d073b50ddc96a9996eef8f47cb9b04b
SHA2569124e6062db2c318517de2d45158e3f7e580e20884d80ee03625861f830f94fa
SHA5122bc19355cc23cfa3c43e629d39742a8ceb75bec402202cbaaea78e39f452da250296628c0f35ff043047458275eaaca4f9b04768754f4ce475d92b4c32521a95
-
\Program Files (x86)\Microsoft\WaterMark.exeFilesize
121KB
MD52299a2d6f8d62723d3d76cac0bc2c01b
SHA1a2c396aa7d073b50ddc96a9996eef8f47cb9b04b
SHA2569124e6062db2c318517de2d45158e3f7e580e20884d80ee03625861f830f94fa
SHA5122bc19355cc23cfa3c43e629d39742a8ceb75bec402202cbaaea78e39f452da250296628c0f35ff043047458275eaaca4f9b04768754f4ce475d92b4c32521a95
-
\Program Files (x86)\Microsoft\WaterMark.exeFilesize
121KB
MD52299a2d6f8d62723d3d76cac0bc2c01b
SHA1a2c396aa7d073b50ddc96a9996eef8f47cb9b04b
SHA2569124e6062db2c318517de2d45158e3f7e580e20884d80ee03625861f830f94fa
SHA5122bc19355cc23cfa3c43e629d39742a8ceb75bec402202cbaaea78e39f452da250296628c0f35ff043047458275eaaca4f9b04768754f4ce475d92b4c32521a95
-
memory/676-66-0x0000000020010000-0x0000000020022000-memory.dmpFilesize
72KB
-
memory/676-71-0x0000000020010000-0x0000000020022000-memory.dmpFilesize
72KB
-
memory/676-179-0x0000000020010000-0x0000000020022000-memory.dmpFilesize
72KB
-
memory/676-62-0x0000000020010000-0x0000000020022000-memory.dmpFilesize
72KB
-
memory/676-64-0x0000000000000000-mapping.dmp
-
memory/676-65-0x0000000075D71000-0x0000000075D73000-memory.dmpFilesize
8KB
-
memory/820-75-0x0000000000000000-mapping.dmp
-
memory/820-73-0x0000000020010000-0x000000002001B000-memory.dmpFilesize
44KB
-
memory/820-76-0x0000000020010000-0x000000002001B000-memory.dmpFilesize
44KB
-
memory/1500-57-0x0000000000400000-0x0000000000427000-memory.dmpFilesize
156KB
-
memory/1500-60-0x0000000000220000-0x0000000000247000-memory.dmpFilesize
156KB
-
memory/1932-70-0x0000000000400000-0x0000000000427000-memory.dmpFilesize
156KB
-
memory/1932-56-0x0000000000000000-mapping.dmp
-
memory/1932-129-0x0000000020020000-0x000000002002B000-memory.dmpFilesize
44KB
-
memory/1932-128-0x0000000020021000-0x0000000020028000-memory.dmpFilesize
28KB
-
memory/1932-178-0x0000000000400000-0x0000000000427000-memory.dmpFilesize
156KB