Analysis
-
max time kernel
15s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 05:11
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
06fe771d38554d76d8062e77dbf7e3e7.exe
Resource
win7-20231129-en
11 signatures
150 seconds
General
-
Target
06fe771d38554d76d8062e77dbf7e3e7.exe
-
Size
380KB
-
MD5
06fe771d38554d76d8062e77dbf7e3e7
-
SHA1
9b1e9b74f79e9ffafcf9bc05edad17fb2032ff00
-
SHA256
8efb1e2bfe1fde6640feb7ce70f3235a9cd7f474cac06f2414aead965d107c69
-
SHA512
6f657686fd867a7619bc903b6dc4201b9b2ee5501eb41c03b0cf8b5075043930c5cc591386df8cc564995400740944f144edc3b8f3b64501de09313a26bf2e18
-
SSDEEP
6144:eMTi0+lfh+L5qe9T5q4GAFzWTBPMmC1UC6fOaIajXBmOWhvP0k2Nw:eMTi0uhMqe9ts2zWTpMmCG7B9mOWhvPV
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,c:\\program files (x86)\\microsoft\\watermark.exe" svchost.exe -
Executes dropped EXE 2 IoCs
pid Process 2216 06fe771d38554d76d8062e77dbf7e3e7mgr.exe 3028 WaterMark.exe -
Loads dropped DLL 4 IoCs
pid Process 2316 06fe771d38554d76d8062e77dbf7e3e7.exe 2316 06fe771d38554d76d8062e77dbf7e3e7.exe 2216 06fe771d38554d76d8062e77dbf7e3e7mgr.exe 2216 06fe771d38554d76d8062e77dbf7e3e7mgr.exe -
resource yara_rule behavioral1/memory/2216-19-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2216-30-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/3028-45-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/3028-44-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2216-22-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2216-21-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2216-18-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2216-17-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2216-15-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/3028-428-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\dmlconf.dat svchost.exe File opened for modification C:\Windows\SysWOW64\dmlconf.dat svchost.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\InkWatson.exe svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\IpsMigrationPlugin.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\msinfo32.exe svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Hand Prints.htm svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\vstoee.dll svchost.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\MSTTSCommon.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Shades of Blue.htm svchost.exe File opened for modification C:\Program Files\Common Files\System\ado\msader15.dll svchost.exe File opened for modification C:\Program Files\7-Zip\7-zip32.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\mshwjpnr.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\tabskb.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\TipRes.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\tipskins.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPCEXT.DLL svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\FlickLearningWizard.exe svchost.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\MSTTSEngine.dll svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\pxCCD.tmp 06fe771d38554d76d8062e77dbf7e3e7mgr.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe 06fe771d38554d76d8062e77dbf7e3e7mgr.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\IpsPlugin.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\rtscom.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\MSOXEV.DLL svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\VSTOLoader.dll svchost.exe File opened for modification C:\Program Files\7-Zip\7z.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\InkDiv.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\IPSEventLogMsg.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\CsiSoap.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\MSOXMLMF.DLL svchost.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\VISFILT.DLL svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPWMI.DLL svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Green Bubbles.htm svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VGX\VGX.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\mip.exe svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPC.DLL svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VC\msdia100.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\mshwjpn.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Garden.htm svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\VSTOInstaller.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7-zip.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\offfiltx.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ConvertInkStore.exe svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\tipresx.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Bears.htm svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\InputPersonalization.exe svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\imjplm.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\mshwgst.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\TabIpsps.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\tiptsf.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Roses.htm svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\1033\VSTOLoaderUI.dll svchost.exe File opened for modification C:\Program Files\7-Zip\7z.exe svchost.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ShapeCollector.exe svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\TipBand.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPOBJS.DLL svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\1033\VSTOInstallerUI.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\msgfilt.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\dicjp.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\Microsoft.Ink.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\tpcps.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\msoshext.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Soft Blue.htm svchost.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 3028 WaterMark.exe 3028 WaterMark.exe 3028 WaterMark.exe 3028 WaterMark.exe 3028 WaterMark.exe 3028 WaterMark.exe 3028 WaterMark.exe 3028 WaterMark.exe 2532 svchost.exe 2532 svchost.exe 2532 svchost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3028 WaterMark.exe Token: SeDebugPrivilege 2532 svchost.exe Token: SeDebugPrivilege 3028 WaterMark.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2216 06fe771d38554d76d8062e77dbf7e3e7mgr.exe 3028 WaterMark.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2216 2316 06fe771d38554d76d8062e77dbf7e3e7.exe 18 PID 2316 wrote to memory of 2216 2316 06fe771d38554d76d8062e77dbf7e3e7.exe 18 PID 2316 wrote to memory of 2216 2316 06fe771d38554d76d8062e77dbf7e3e7.exe 18 PID 2316 wrote to memory of 2216 2316 06fe771d38554d76d8062e77dbf7e3e7.exe 18 PID 2216 wrote to memory of 3028 2216 06fe771d38554d76d8062e77dbf7e3e7mgr.exe 17 PID 2216 wrote to memory of 3028 2216 06fe771d38554d76d8062e77dbf7e3e7mgr.exe 17 PID 2216 wrote to memory of 3028 2216 06fe771d38554d76d8062e77dbf7e3e7mgr.exe 17 PID 2216 wrote to memory of 3028 2216 06fe771d38554d76d8062e77dbf7e3e7mgr.exe 17 PID 3028 wrote to memory of 2868 3028 WaterMark.exe 16 PID 3028 wrote to memory of 2868 3028 WaterMark.exe 16 PID 3028 wrote to memory of 2868 3028 WaterMark.exe 16 PID 3028 wrote to memory of 2868 3028 WaterMark.exe 16 PID 3028 wrote to memory of 2868 3028 WaterMark.exe 16 PID 3028 wrote to memory of 2868 3028 WaterMark.exe 16 PID 3028 wrote to memory of 2868 3028 WaterMark.exe 16 PID 3028 wrote to memory of 2868 3028 WaterMark.exe 16 PID 3028 wrote to memory of 2868 3028 WaterMark.exe 16 PID 3028 wrote to memory of 2868 3028 WaterMark.exe 16 PID 3028 wrote to memory of 2532 3028 WaterMark.exe 32 PID 3028 wrote to memory of 2532 3028 WaterMark.exe 32 PID 3028 wrote to memory of 2532 3028 WaterMark.exe 32 PID 3028 wrote to memory of 2532 3028 WaterMark.exe 32 PID 3028 wrote to memory of 2532 3028 WaterMark.exe 32 PID 3028 wrote to memory of 2532 3028 WaterMark.exe 32 PID 3028 wrote to memory of 2532 3028 WaterMark.exe 32 PID 3028 wrote to memory of 2532 3028 WaterMark.exe 32 PID 3028 wrote to memory of 2532 3028 WaterMark.exe 32 PID 3028 wrote to memory of 2532 3028 WaterMark.exe 32 PID 2532 wrote to memory of 260 2532 svchost.exe 31 PID 2532 wrote to memory of 260 2532 svchost.exe 31 PID 2532 wrote to memory of 260 2532 svchost.exe 31 PID 2532 wrote to memory of 260 2532 svchost.exe 31 PID 2532 wrote to memory of 260 2532 svchost.exe 31 PID 2532 wrote to memory of 336 2532 svchost.exe 30 PID 2532 wrote to memory of 336 2532 svchost.exe 30 PID 2532 wrote to memory of 336 2532 svchost.exe 30 PID 2532 wrote to memory of 336 2532 svchost.exe 30 PID 2532 wrote to memory of 336 2532 svchost.exe 30 PID 2532 wrote to memory of 384 2532 svchost.exe 29 PID 2532 wrote to memory of 384 2532 svchost.exe 29 PID 2532 wrote to memory of 384 2532 svchost.exe 29 PID 2532 wrote to memory of 384 2532 svchost.exe 29 PID 2532 wrote to memory of 384 2532 svchost.exe 29 PID 2532 wrote to memory of 400 2532 svchost.exe 28 PID 2532 wrote to memory of 400 2532 svchost.exe 28 PID 2532 wrote to memory of 400 2532 svchost.exe 28 PID 2532 wrote to memory of 400 2532 svchost.exe 28 PID 2532 wrote to memory of 400 2532 svchost.exe 28 PID 2532 wrote to memory of 436 2532 svchost.exe 27 PID 2532 wrote to memory of 436 2532 svchost.exe 27 PID 2532 wrote to memory of 436 2532 svchost.exe 27 PID 2532 wrote to memory of 436 2532 svchost.exe 27 PID 2532 wrote to memory of 436 2532 svchost.exe 27 PID 2532 wrote to memory of 480 2532 svchost.exe 2 PID 2532 wrote to memory of 480 2532 svchost.exe 2 PID 2532 wrote to memory of 480 2532 svchost.exe 2 PID 2532 wrote to memory of 480 2532 svchost.exe 2 PID 2532 wrote to memory of 480 2532 svchost.exe 2 PID 2532 wrote to memory of 496 2532 svchost.exe 1 PID 2532 wrote to memory of 496 2532 svchost.exe 1 PID 2532 wrote to memory of 496 2532 svchost.exe 1 PID 2532 wrote to memory of 496 2532 svchost.exe 1 PID 2532 wrote to memory of 496 2532 svchost.exe 1 PID 2532 wrote to memory of 504 2532 svchost.exe 26
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:496
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵PID:480
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵PID:240
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵PID:944
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵PID:2112
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵PID:1196
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵PID:976
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵PID:300
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵PID:992
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵PID:844
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵PID:820
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:768
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵PID:676
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵PID:604
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1336
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1312
-
C:\Users\Admin\AppData\Local\Temp\06fe771d38554d76d8062e77dbf7e3e7.exe"C:\Users\Admin\AppData\Local\Temp\06fe771d38554d76d8062e77dbf7e3e7.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2316
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1280
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe1⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Drops file in Program Files directory
PID:2868
-
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2532
-
-
C:\Users\Admin\AppData\Local\Temp\06fe771d38554d76d8062e77dbf7e3e7mgr.exeC:\Users\Admin\AppData\Local\Temp\06fe771d38554d76d8062e77dbf7e3e7mgr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2216
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe1⤵PID:504
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:436
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:400
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:384
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:336
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe1⤵PID:260