Analysis
-
max time kernel
35s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 02:03
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4b517c42028fb96a2baddee01c617387.exe
Resource
win7-20231215-en
2 signatures
150 seconds
General
-
Target
4b517c42028fb96a2baddee01c617387.exe
-
Size
95KB
-
MD5
4b517c42028fb96a2baddee01c617387
-
SHA1
9f41039a17ae6c6257fde108ab1b242d1b071d7c
-
SHA256
f8c8781b939b8bf8675c0494a9c65c0bb3cc130dea2187a85e61ffa3c320b6cd
-
SHA512
62dfd35ade709bf72ddb6039ce4cfca3b3f90144fd6a12ed6083a2b315d83dfc21d9ae5589b0a0b73c40fc21dcf01d18faacc11dbef6c0645ea8da47f25e0147
-
SSDEEP
768:D06R0UKzOgnKqGR7//GPc0LOBhvBrHks3IiyhDYQbGmxlNaM+WGa1wuxnzgOYw9Y:BR0vxn3Pc0LCH9MtbvabUDzJYWu3B
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3448 WaterMark.exe -
resource yara_rule behavioral2/memory/2712-4-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/2712-11-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/3448-27-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/3448-26-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/3448-24-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/2712-9-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/2712-8-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/2712-7-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/2712-5-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/2712-2-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/3448-33-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe 4b517c42028fb96a2baddee01c617387.exe File opened for modification C:\Program Files (x86)\Microsoft\px4A09.tmp 4b517c42028fb96a2baddee01c617387.exe File created C:\Program Files (x86)\Microsoft\WaterMark.exe 4b517c42028fb96a2baddee01c617387.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2112 5088 WerFault.exe 15 -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{A760EA8B-A46A-11EE-9ECD-42E20219F0C2} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 3448 WaterMark.exe 3448 WaterMark.exe 3448 WaterMark.exe 3448 WaterMark.exe 3448 WaterMark.exe 3448 WaterMark.exe 3448 WaterMark.exe 3448 WaterMark.exe 3448 WaterMark.exe 3448 WaterMark.exe 3448 WaterMark.exe 3448 WaterMark.exe 3448 WaterMark.exe 3448 WaterMark.exe 3448 WaterMark.exe 3448 WaterMark.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3448 WaterMark.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 760 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 760 iexplore.exe 760 iexplore.exe 5072 IEXPLORE.EXE 5072 IEXPLORE.EXE 5072 IEXPLORE.EXE 5072 IEXPLORE.EXE -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2712 4b517c42028fb96a2baddee01c617387.exe 3448 WaterMark.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2712 wrote to memory of 3448 2712 4b517c42028fb96a2baddee01c617387.exe 22 PID 2712 wrote to memory of 3448 2712 4b517c42028fb96a2baddee01c617387.exe 22 PID 2712 wrote to memory of 3448 2712 4b517c42028fb96a2baddee01c617387.exe 22 PID 3448 wrote to memory of 5088 3448 WaterMark.exe 15 PID 3448 wrote to memory of 5088 3448 WaterMark.exe 15 PID 3448 wrote to memory of 5088 3448 WaterMark.exe 15 PID 3448 wrote to memory of 5088 3448 WaterMark.exe 15 PID 3448 wrote to memory of 5088 3448 WaterMark.exe 15 PID 3448 wrote to memory of 5088 3448 WaterMark.exe 15 PID 3448 wrote to memory of 5088 3448 WaterMark.exe 15 PID 3448 wrote to memory of 5088 3448 WaterMark.exe 15 PID 3448 wrote to memory of 5088 3448 WaterMark.exe 15 PID 3448 wrote to memory of 760 3448 WaterMark.exe 72 PID 3448 wrote to memory of 760 3448 WaterMark.exe 72 PID 3448 wrote to memory of 4012 3448 WaterMark.exe 70 PID 3448 wrote to memory of 4012 3448 WaterMark.exe 70 PID 760 wrote to memory of 5072 760 iexplore.exe 71 PID 760 wrote to memory of 5072 760 iexplore.exe 71 PID 760 wrote to memory of 5072 760 iexplore.exe 71
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b517c42028fb96a2baddee01c617387.exe"C:\Users\Admin\AppData\Local\Temp\4b517c42028fb96a2baddee01c617387.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
PID:4012
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:760
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe1⤵PID:5088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5088 -s 2042⤵
- Program crash
PID:2112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 5088 -ip 50881⤵PID:4224
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:760 CREDAT:17410 /prefetch:21⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:5072