Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
87s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/12/2024, 16:26
Static task
static1
Behavioral task
behavioral1
Sample
410c5ca58e6ceea8c7f62d750011eb0e1c2dfffbab3ffe17832ad1aef3ef4146.dll
Resource
win7-20240903-en
General
-
Target
410c5ca58e6ceea8c7f62d750011eb0e1c2dfffbab3ffe17832ad1aef3ef4146.dll
-
Size
439KB
-
MD5
b2b9e4fea189984d23d8620d98d68984
-
SHA1
dd299d80fda6a7bfef0e31a961e926f1ae65ea50
-
SHA256
410c5ca58e6ceea8c7f62d750011eb0e1c2dfffbab3ffe17832ad1aef3ef4146
-
SHA512
5385432643796a88b082b7bb8d67fb1de2d9a6e6dff1b0f41f579ab57308232c6d08e4abb4aede0da774c1ef10e65e213c7493c6ab50f438ca064c1545dc49a9
-
SSDEEP
6144:yOp8HpzdQOStK+XsAWxnuTNo3+wO90oi8h:yOp8Hpz7+XsBJ+SXO9g8h
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,c:\\program files (x86)\\microsoft\\watermark.exe" svchost.exe -
Ramnit family
-
Executes dropped EXE 4 IoCs
pid Process 2504 rundll32mgr.exe 2876 rundll32mgrmgr.exe 2816 WaterMark.exe 2688 WaterMark.exe -
Loads dropped DLL 8 IoCs
pid Process 2304 rundll32.exe 2304 rundll32.exe 2504 rundll32mgr.exe 2504 rundll32mgr.exe 2876 rundll32mgrmgr.exe 2504 rundll32mgr.exe 2876 rundll32mgrmgr.exe 2504 rundll32mgr.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe File created C:\Windows\SysWOW64\rundll32mgrmgr.exe rundll32mgr.exe File created C:\Windows\SysWOW64\dmlconf.dat svchost.exe File opened for modification C:\Windows\SysWOW64\dmlconf.dat svchost.exe -
resource yara_rule behavioral1/memory/2688-65-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2504-52-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2876-42-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2876-29-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2876-28-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2504-22-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2504-21-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2504-20-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2504-19-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2304-115-0x0000000000320000-0x0000000000384000-memory.dmp upx behavioral1/memory/2816-109-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2816-108-0x0000000000400000-0x0000000000439000-memory.dmp upx behavioral1/memory/2688-107-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2688-105-0x0000000000400000-0x0000000000439000-memory.dmp upx behavioral1/memory/2688-781-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2816-782-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2688-787-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libmpgv_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Journal\NBDoc.DLL svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\libaccess_realrtsp_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\librtp_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access_output\libaccess_output_http_plugin.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\servertool.exe svchost.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\msdaosp.dll svchost.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\oledb32.dll svchost.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\Shvl.dll svchost.exe File opened for modification C:\Program Files\Microsoft Office\Office14\BCSLaunch.dll svchost.exe File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-crt-conio-l1-1-0.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\fr\System.ServiceModel.Resources.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\fr\UIAutomationTypes.resources.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Roses.htm svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libzvbi_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_chroma\libi420_yuy2_mmx_plugin.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fr\Microsoft.Build.Utilities.v3.5.resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\view.html svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libaraw_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libsubsusf_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libmjpeg_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\spu\libmosaic_plugin.dll svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.exe svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\it\System.Xml.Linq.Resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\control\libntservice_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\services_discovery\libpodcast_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Mail\wabimp.dll svchost.exe File opened for modification C:\Program Files\Microsoft Games\Chess\Chess.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Green Bubbles.htm svchost.exe File opened for modification C:\Program Files\DVD Maker\WMM2CLIP.dll svchost.exe File opened for modification C:\Program Files\Mozilla Firefox\api-ms-win-core-file-l2-1-0.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\UIAutomationTypes.resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\services_discovery\libwindrive_plugin.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\TipBand.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libwave_plugin.dll svchost.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\bckgzm.exe svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\hprof.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\System.AddIn.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access_output\libaccess_output_file_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Media Player\WMPDMCCore.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\sunec.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\servertool.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\about.html svchost.exe File opened for modification C:\Program Files\Mozilla Firefox\freebl3.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\mobile_view.html svchost.exe File opened for modification C:\Program Files\Windows Media Player\wmplayer.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\appletviewer.exe svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\awt.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\fr\System.IO.Log.Resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libogg_plugin.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\rmiregistry.exe svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\orbd.exe svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\PresentationFramework.resources.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\System.ServiceModel.Web.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libaiff_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\visualization\libglspectrum_plugin.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\glib-lite.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libttml_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\d3d11\libdirect3d11_filters_plugin.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\de\System.Data.Entity.Design.Resources.dll svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\dtplugin\deployJava1.dll svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\de-DE\clock.html svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\libEGL.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_filter\libsamplerate_plugin.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WaterMark.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgrmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WaterMark.exe -
Suspicious behavior: EnumeratesProcesses 40 IoCs
pid Process 2816 WaterMark.exe 2816 WaterMark.exe 2688 WaterMark.exe 2688 WaterMark.exe 2688 WaterMark.exe 2688 WaterMark.exe 2688 WaterMark.exe 2688 WaterMark.exe 2688 WaterMark.exe 2688 WaterMark.exe 2816 WaterMark.exe 2816 WaterMark.exe 2816 WaterMark.exe 2816 WaterMark.exe 2844 svchost.exe 2816 WaterMark.exe 2816 WaterMark.exe 2844 svchost.exe 2844 svchost.exe 2844 svchost.exe 2844 svchost.exe 2844 svchost.exe 2844 svchost.exe 2844 svchost.exe 2844 svchost.exe 2844 svchost.exe 2844 svchost.exe 2844 svchost.exe 2844 svchost.exe 2844 svchost.exe 2844 svchost.exe 2844 svchost.exe 2844 svchost.exe 2844 svchost.exe 2844 svchost.exe 2844 svchost.exe 2844 svchost.exe 2844 svchost.exe 2844 svchost.exe 2844 svchost.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2816 WaterMark.exe Token: SeDebugPrivilege 2688 WaterMark.exe Token: SeDebugPrivilege 2844 svchost.exe Token: SeDebugPrivilege 1704 svchost.exe Token: SeDebugPrivilege 2304 rundll32.exe Token: SeDebugPrivilege 2816 WaterMark.exe Token: SeDebugPrivilege 2688 WaterMark.exe Token: SeDebugPrivilege 2592 svchost.exe -
Suspicious use of UnmapMainImage 4 IoCs
pid Process 2504 rundll32mgr.exe 2876 rundll32mgrmgr.exe 2816 WaterMark.exe 2688 WaterMark.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2512 wrote to memory of 2304 2512 rundll32.exe 31 PID 2512 wrote to memory of 2304 2512 rundll32.exe 31 PID 2512 wrote to memory of 2304 2512 rundll32.exe 31 PID 2512 wrote to memory of 2304 2512 rundll32.exe 31 PID 2512 wrote to memory of 2304 2512 rundll32.exe 31 PID 2512 wrote to memory of 2304 2512 rundll32.exe 31 PID 2512 wrote to memory of 2304 2512 rundll32.exe 31 PID 2304 wrote to memory of 2504 2304 rundll32.exe 32 PID 2304 wrote to memory of 2504 2304 rundll32.exe 32 PID 2304 wrote to memory of 2504 2304 rundll32.exe 32 PID 2304 wrote to memory of 2504 2304 rundll32.exe 32 PID 2504 wrote to memory of 2876 2504 rundll32mgr.exe 33 PID 2504 wrote to memory of 2876 2504 rundll32mgr.exe 33 PID 2504 wrote to memory of 2876 2504 rundll32mgr.exe 33 PID 2504 wrote to memory of 2876 2504 rundll32mgr.exe 33 PID 2876 wrote to memory of 2816 2876 rundll32mgrmgr.exe 34 PID 2876 wrote to memory of 2816 2876 rundll32mgrmgr.exe 34 PID 2876 wrote to memory of 2816 2876 rundll32mgrmgr.exe 34 PID 2876 wrote to memory of 2816 2876 rundll32mgrmgr.exe 34 PID 2504 wrote to memory of 2688 2504 rundll32mgr.exe 35 PID 2504 wrote to memory of 2688 2504 rundll32mgr.exe 35 PID 2504 wrote to memory of 2688 2504 rundll32mgr.exe 35 PID 2504 wrote to memory of 2688 2504 rundll32mgr.exe 35 PID 2688 wrote to memory of 2580 2688 WaterMark.exe 36 PID 2688 wrote to memory of 2580 2688 WaterMark.exe 36 PID 2688 wrote to memory of 2580 2688 WaterMark.exe 36 PID 2688 wrote to memory of 2580 2688 WaterMark.exe 36 PID 2688 wrote to memory of 2580 2688 WaterMark.exe 36 PID 2688 wrote to memory of 2580 2688 WaterMark.exe 36 PID 2688 wrote to memory of 2580 2688 WaterMark.exe 36 PID 2688 wrote to memory of 2580 2688 WaterMark.exe 36 PID 2688 wrote to memory of 2580 2688 WaterMark.exe 36 PID 2688 wrote to memory of 2580 2688 WaterMark.exe 36 PID 2816 wrote to memory of 2592 2816 WaterMark.exe 37 PID 2816 wrote to memory of 2592 2816 WaterMark.exe 37 PID 2816 wrote to memory of 2592 2816 WaterMark.exe 37 PID 2816 wrote to memory of 2592 2816 WaterMark.exe 37 PID 2816 wrote to memory of 2592 2816 WaterMark.exe 37 PID 2816 wrote to memory of 2592 2816 WaterMark.exe 37 PID 2816 wrote to memory of 2592 2816 WaterMark.exe 37 PID 2816 wrote to memory of 2592 2816 WaterMark.exe 37 PID 2816 wrote to memory of 2592 2816 WaterMark.exe 37 PID 2816 wrote to memory of 2592 2816 WaterMark.exe 37 PID 2688 wrote to memory of 2844 2688 WaterMark.exe 38 PID 2688 wrote to memory of 2844 2688 WaterMark.exe 38 PID 2688 wrote to memory of 2844 2688 WaterMark.exe 38 PID 2688 wrote to memory of 2844 2688 WaterMark.exe 38 PID 2688 wrote to memory of 2844 2688 WaterMark.exe 38 PID 2688 wrote to memory of 2844 2688 WaterMark.exe 38 PID 2688 wrote to memory of 2844 2688 WaterMark.exe 38 PID 2688 wrote to memory of 2844 2688 WaterMark.exe 38 PID 2688 wrote to memory of 2844 2688 WaterMark.exe 38 PID 2688 wrote to memory of 2844 2688 WaterMark.exe 38 PID 2816 wrote to memory of 1704 2816 WaterMark.exe 39 PID 2816 wrote to memory of 1704 2816 WaterMark.exe 39 PID 2816 wrote to memory of 1704 2816 WaterMark.exe 39 PID 2816 wrote to memory of 1704 2816 WaterMark.exe 39 PID 2816 wrote to memory of 1704 2816 WaterMark.exe 39 PID 2816 wrote to memory of 1704 2816 WaterMark.exe 39 PID 2816 wrote to memory of 1704 2816 WaterMark.exe 39 PID 2816 wrote to memory of 1704 2816 WaterMark.exe 39 PID 2816 wrote to memory of 1704 2816 WaterMark.exe 39 PID 2816 wrote to memory of 1704 2816 WaterMark.exe 39 PID 2844 wrote to memory of 256 2844 svchost.exe 1
Processes
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe1⤵PID:256
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:332
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:384
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe2⤵PID:476
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch3⤵PID:600
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}4⤵PID:1284
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe4⤵PID:1768
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -Embedding4⤵PID:2944
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS3⤵PID:680
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted3⤵PID:744
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted3⤵PID:828
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"4⤵PID:1172
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs3⤵PID:864
-
\\?\C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R4⤵PID:2116
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService3⤵PID:980
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService3⤵PID:268
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe3⤵PID:308
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork3⤵PID:1060
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"3⤵PID:1116
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"3⤵PID:1616
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation3⤵PID:1584
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe3⤵PID:2392
-
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe2⤵PID:492
-
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:500
-
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:392
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:432
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1216
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\410c5ca58e6ceea8c7f62d750011eb0e1c2dfffbab3ffe17832ad1aef3ef4146.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\410c5ca58e6ceea8c7f62d750011eb0e1c2dfffbab3ffe17832ad1aef3ef4146.dll,#13⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SysWOW64\rundll32mgrmgr.exeC:\Windows\SysWOW64\rundll32mgrmgr.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2592
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1704
-
-
-
-
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe6⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2580
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe6⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2844
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\epl-v10.html
Filesize350KB
MD55103dd248f2dba2a8ac9f8bc4ee8a78e
SHA1e586cddd12bdc6f0b877ff41251e42127a9e97a5
SHA256ffdf8c20408090e4224bf42c615443891805010c032023daa715db434df671f3
SHA512d5d2e28fd3e2d5fdb6930fd3ee74d37735607e0b8abeef310eb8fd3da489cc4583b4f8f44da6a8c3308f6aef6e9e2ce43ac3feb74606f8d53acdacd176e371a0
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\license.html
Filesize346KB
MD5284068863b3e4e4c3c5ec0f1fc6c6d99
SHA1e5a10c812f4809b710aea26cb0f8d513b355ffd5
SHA25682b175fc7107488d2bb7b31274dff119a813e70b597c6055f146f3ed48a8d523
SHA512d8f1531b44ac9211565187bbeb29494da6bdd3b2c844e1e0cd932c29b20061079fed39f5cc0468ba9aaeccab79aa34fea8b8a00606c3aab55b262cb141ddb410
-
Filesize
339KB
MD57385f723cdfd6a19523b29e19fe63e39
SHA16eb6694a76aab6587eb45575f380cc7a80c66bc5
SHA256a50f5786e2dd07cfbc89f72484e3af5dcccc31d476713bd7b433c6f74ebc4e37
SHA512858c17a06aec78976775cd9df4f2652cfb97e35c14aa863e88f27cd332c6b6ecdb0c062d0cfdb53436981b50ba4681ebe04d00128df8be67398d021aa6d83632
-
Filesize
168KB
MD50943b815c588255874985439061ba474
SHA131ad4cdb76003b35f553cb96c78d887e7c960eba
SHA2567b1559c2f8d511f7be152a22809b358088048fc3e00d9963b92ad0ecb384bf51
SHA512fce7596624b5c224cbaaae55c4b224ff995eea33ed0ca9d40c33cfb5ffaa98f387f267175788f5431ca7209c2c69ef1024b9541f7b53a1a3c6412b09a19bd601