Analysis
-
max time kernel
3s -
max time network
66s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2024 20:08
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
53b233c6c23409aa87d7982565849165.dll
Resource
win7-20231215-en
windows7-x64
11 signatures
150 seconds
General
-
Target
53b233c6c23409aa87d7982565849165.dll
-
Size
166KB
-
MD5
53b233c6c23409aa87d7982565849165
-
SHA1
f3b0d0f6869a017892d7838d60fa9738d648d0e5
-
SHA256
f2db305bb87e418623361ca81fc600864d14e270f3b23a4a0248b9ada86c1543
-
SHA512
2f2fa21b020fcc3b9f76b2874c74b0a37cf4c7da96dab5111bc3fa481bd767bcd503a476998fc1d0daf5cb5b2b315124c71486ef33325279670eafd55fdb1ef0
-
SSDEEP
3072:pTU56gVxj27NevROEuPvisOpkTv7L2GQ6uE:G4wRj+qYvW4uE
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2196 regsvr32mgr.exe 4292 WaterMark.exe -
resource yara_rule behavioral2/memory/2196-9-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4292-22-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral2/memory/4292-29-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/2196-15-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/2196-11-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/2196-10-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/2196-12-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/2196-8-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/2196-7-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/2196-6-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4292-39-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4292-40-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\regsvr32mgr.exe regsvr32.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe regsvr32mgr.exe File opened for modification C:\Program Files (x86)\Microsoft\px4556.tmp regsvr32mgr.exe File created C:\Program Files (x86)\Microsoft\WaterMark.exe regsvr32mgr.exe -
Program crash 1 IoCs
pid pid_target Process 3844 4788 WerFault.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 4292 WaterMark.exe 4292 WaterMark.exe 4292 WaterMark.exe 4292 WaterMark.exe 4292 WaterMark.exe 4292 WaterMark.exe 4292 WaterMark.exe 4292 WaterMark.exe 4292 WaterMark.exe 4292 WaterMark.exe 4292 WaterMark.exe 4292 WaterMark.exe 4292 WaterMark.exe 4292 WaterMark.exe 4292 WaterMark.exe 4292 WaterMark.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4292 WaterMark.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2196 regsvr32mgr.exe 4292 WaterMark.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 3452 wrote to memory of 1512 3452 regsvr32.exe 16 PID 3452 wrote to memory of 1512 3452 regsvr32.exe 16 PID 3452 wrote to memory of 1512 3452 regsvr32.exe 16 PID 1512 wrote to memory of 2196 1512 regsvr32.exe 27 PID 1512 wrote to memory of 2196 1512 regsvr32.exe 27 PID 1512 wrote to memory of 2196 1512 regsvr32.exe 27 PID 2196 wrote to memory of 4292 2196 regsvr32mgr.exe 26 PID 2196 wrote to memory of 4292 2196 regsvr32mgr.exe 26 PID 2196 wrote to memory of 4292 2196 regsvr32mgr.exe 26 PID 4292 wrote to memory of 4788 4292 WaterMark.exe 25 PID 4292 wrote to memory of 4788 4292 WaterMark.exe 25 PID 4292 wrote to memory of 4788 4292 WaterMark.exe 25 PID 4292 wrote to memory of 4788 4292 WaterMark.exe 25 PID 4292 wrote to memory of 4788 4292 WaterMark.exe 25 PID 4292 wrote to memory of 4788 4292 WaterMark.exe 25 PID 4292 wrote to memory of 4788 4292 WaterMark.exe 25 PID 4292 wrote to memory of 4788 4292 WaterMark.exe 25 PID 4292 wrote to memory of 4788 4292 WaterMark.exe 25 PID 4292 wrote to memory of 3044 4292 WaterMark.exe 64 PID 4292 wrote to memory of 3044 4292 WaterMark.exe 64 PID 4292 wrote to memory of 2796 4292 WaterMark.exe 65 PID 4292 wrote to memory of 2796 4292 WaterMark.exe 65
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\53b233c6c23409aa87d7982565849165.dll1⤵
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\53b233c6c23409aa87d7982565849165.dll2⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\SysWOW64\regsvr32mgr.exeC:\Windows\SysWOW64\regsvr32mgr.exe3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2196
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4788 -ip 47881⤵PID:4392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4788 -s 2041⤵
- Program crash
PID:3844
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe1⤵PID:4788
-
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵
- Modifies Internet Explorer settings
PID:3044 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3044 CREDAT:17410 /prefetch:23⤵PID:1204
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵
- Modifies Internet Explorer settings
PID:2796 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2796 CREDAT:17410 /prefetch:23⤵PID:3644
-
-