Analysis
-
max time kernel
3s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
06-01-2024 10:42
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3c637afe2b5b7c2eaa54f6c8fec6f619.exe
Resource
win7-20231129-en
windows7-x64
12 signatures
150 seconds
General
-
Target
3c637afe2b5b7c2eaa54f6c8fec6f619.exe
-
Size
400KB
-
MD5
3c637afe2b5b7c2eaa54f6c8fec6f619
-
SHA1
243880b0a824f4e79a1886c47f28d9f92f62a92f
-
SHA256
35baf27fd781c9a61e35c7ab6876a8b0ab1d9e955684eeb2125306e9e4c5058c
-
SHA512
00f3758ac5f8b399b0253b38b73463fb117d01992bac91feeee4656531fc8651e5904e37fc54fd5952729e633991281f457dec85ba5bf12315a74f859d0da3e8
-
SSDEEP
6144:Qy+WiBQDdCxKHsEbBv4oCTsJTcpWJ+L+EJbc+iN:D+ZBQxCAMEbBgoCTMAp9iEPiN
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,c:\\program files (x86)\\microsoft\\watermark.exe" svchost.exe -
Executes dropped EXE 2 IoCs
pid Process 2880 3c637afe2b5b7c2eaa54f6c8fec6f619mgr.exe 2740 WaterMark.exe -
Loads dropped DLL 4 IoCs
pid Process 1680 3c637afe2b5b7c2eaa54f6c8fec6f619.exe 1680 3c637afe2b5b7c2eaa54f6c8fec6f619.exe 2880 3c637afe2b5b7c2eaa54f6c8fec6f619mgr.exe 2880 3c637afe2b5b7c2eaa54f6c8fec6f619mgr.exe -
resource yara_rule behavioral1/memory/2880-17-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2740-40-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2740-41-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2880-22-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2880-18-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2880-16-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2880-14-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2880-13-0x0000000000400000-0x0000000000428E39-memory.dmp upx behavioral1/memory/2880-11-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2880-9-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2740-458-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2740-462-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\dmlconf.dat svchost.exe File created C:\Windows\SysWOW64\dmlconf.dat svchost.exe -
Drops file in Program Files directory 10 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\7zFM.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7zG.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\px147A.tmp 3c637afe2b5b7c2eaa54f6c8fec6f619mgr.exe File created C:\Program Files (x86)\Microsoft\WaterMark.exe 3c637afe2b5b7c2eaa54f6c8fec6f619mgr.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe 3c637afe2b5b7c2eaa54f6c8fec6f619mgr.exe File opened for modification C:\Program Files\7-Zip\7z.dll svchost.exe File opened for modification C:\Program Files\7-Zip\7z.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7-zip.dll svchost.exe File opened for modification C:\Program Files\7-Zip\7-zip32.dll svchost.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2740 WaterMark.exe 2740 WaterMark.exe 2740 WaterMark.exe 2740 WaterMark.exe 2740 WaterMark.exe 2740 WaterMark.exe 2740 WaterMark.exe 2740 WaterMark.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2740 WaterMark.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1680 3c637afe2b5b7c2eaa54f6c8fec6f619.exe 1680 3c637afe2b5b7c2eaa54f6c8fec6f619.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2880 3c637afe2b5b7c2eaa54f6c8fec6f619mgr.exe 2740 WaterMark.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1680 wrote to memory of 2880 1680 3c637afe2b5b7c2eaa54f6c8fec6f619.exe 18 PID 1680 wrote to memory of 2880 1680 3c637afe2b5b7c2eaa54f6c8fec6f619.exe 18 PID 1680 wrote to memory of 2880 1680 3c637afe2b5b7c2eaa54f6c8fec6f619.exe 18 PID 1680 wrote to memory of 2880 1680 3c637afe2b5b7c2eaa54f6c8fec6f619.exe 18 PID 2880 wrote to memory of 2740 2880 3c637afe2b5b7c2eaa54f6c8fec6f619mgr.exe 16 PID 2880 wrote to memory of 2740 2880 3c637afe2b5b7c2eaa54f6c8fec6f619mgr.exe 16 PID 2880 wrote to memory of 2740 2880 3c637afe2b5b7c2eaa54f6c8fec6f619mgr.exe 16 PID 2880 wrote to memory of 2740 2880 3c637afe2b5b7c2eaa54f6c8fec6f619mgr.exe 16 PID 2740 wrote to memory of 2640 2740 WaterMark.exe 17 PID 2740 wrote to memory of 2640 2740 WaterMark.exe 17 PID 2740 wrote to memory of 2640 2740 WaterMark.exe 17 PID 2740 wrote to memory of 2640 2740 WaterMark.exe 17 PID 2740 wrote to memory of 2640 2740 WaterMark.exe 17 PID 2740 wrote to memory of 2640 2740 WaterMark.exe 17 PID 2740 wrote to memory of 2640 2740 WaterMark.exe 17 PID 2740 wrote to memory of 2640 2740 WaterMark.exe 17 PID 2740 wrote to memory of 2640 2740 WaterMark.exe 17 PID 2740 wrote to memory of 2640 2740 WaterMark.exe 17 PID 2740 wrote to memory of 2400 2740 WaterMark.exe 31 PID 2740 wrote to memory of 2400 2740 WaterMark.exe 31 PID 2740 wrote to memory of 2400 2740 WaterMark.exe 31 PID 2740 wrote to memory of 2400 2740 WaterMark.exe 31 PID 2740 wrote to memory of 2400 2740 WaterMark.exe 31 PID 2740 wrote to memory of 2400 2740 WaterMark.exe 31 PID 2740 wrote to memory of 2400 2740 WaterMark.exe 31 PID 2740 wrote to memory of 2400 2740 WaterMark.exe 31 PID 2740 wrote to memory of 2400 2740 WaterMark.exe 31 PID 2740 wrote to memory of 2400 2740 WaterMark.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c637afe2b5b7c2eaa54f6c8fec6f619.exe"C:\Users\Admin\AppData\Local\Temp\3c637afe2b5b7c2eaa54f6c8fec6f619.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\3c637afe2b5b7c2eaa54f6c8fec6f619mgr.exeC:\Users\Admin\AppData\Local\Temp\3c637afe2b5b7c2eaa54f6c8fec6f619mgr.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2880
-
-
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe2⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Drops file in Program Files directory
PID:2640
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:2400
-