Analysis
-
max time kernel
91s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2024 23:03
Static task
static1
Behavioral task
behavioral1
Sample
ca4994d8a0dbdbc32bf29555473890fd6d535df4e88f8da49182e9ed3eb2cf14N.dll
Resource
win7-20240729-en
General
-
Target
ca4994d8a0dbdbc32bf29555473890fd6d535df4e88f8da49182e9ed3eb2cf14N.dll
-
Size
2.4MB
-
MD5
ddb05b30f69ee2ff53771593bdc89540
-
SHA1
3dbbd00f62b85ff26a3e18d680b6687e195858c2
-
SHA256
ca4994d8a0dbdbc32bf29555473890fd6d535df4e88f8da49182e9ed3eb2cf14
-
SHA512
f5198a920d891ccdca4383a5b76b107ec7a304c54421add960f35d35b05063342a5476e56e5d4016433212827a21142fd3b6b1b8ad13f7f21ef0d33c7198bd72
-
SSDEEP
49152:xU3U+ZYmxjpv7x4GFM/+b8dTMNh9Wr73h7NXSWEqNJO5hYTVMCRisKEbzc:xiU2YmxjpDx4Zo8dYNh9q73h7NXYkRil
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 6 IoCs
pid Process 1392 rundll32mgr.exe 2396 rundll32mgrmgr.exe 4212 WaterMark.exe 1556 WaterMark.exe 564 WaterMarkmgr.exe 1156 WaterMark.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe File created C:\Windows\SysWOW64\rundll32mgrmgr.exe rundll32mgr.exe -
resource yara_rule behavioral2/memory/1392-18-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/1392-49-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/564-62-0x0000000000400000-0x0000000000438000-memory.dmp upx behavioral2/memory/1556-69-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/564-67-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/2396-61-0x0000000000400000-0x0000000000438000-memory.dmp upx behavioral2/memory/4212-59-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4212-42-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2396-30-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/1392-24-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/1392-17-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/1392-12-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/1392-11-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/1392-10-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/1392-15-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4212-83-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4212-85-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/4212-87-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/1556-89-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/1556-86-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/1156-94-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/4212-95-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Drops file in Program Files directory 10 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\WaterMark.exe rundll32mgrmgr.exe File created C:\Program Files (x86)\Microsoft\WaterMarkmgr.exe WaterMark.exe File opened for modification C:\Program Files (x86)\Microsoft\pxAFC8.tmp rundll32mgr.exe File created C:\Program Files (x86)\Microsoft\WaterMark.exe rundll32mgr.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe rundll32mgr.exe File opened for modification C:\Program Files (x86)\Microsoft\pxAFD7.tmp rundll32mgrmgr.exe File created C:\Program Files (x86)\Microsoft\WaterMarkmgr.exe WaterMark.exe File opened for modification C:\Program Files (x86)\Microsoft\pxB045.tmp WaterMarkmgr.exe File created C:\Program Files (x86)\Microsoft\WaterMark.exe WaterMarkmgr.exe File created C:\Program Files (x86)\Microsoft\WaterMarkmgr.exe WaterMark.exe -
Program crash 4 IoCs
pid pid_target Process procid_target 660 4924 WerFault.exe 3360 4780 WerFault.exe 84 2876 2636 WerFault.exe 3848 4908 WerFault.exe 99 -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WaterMarkmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WaterMark.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WaterMark.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgrmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WaterMark.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31152911" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "730470157" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "732345166" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{570B3E67-C702-11EF-ADF2-CAFD856C81B1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "730626563" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff5800000000000000de04000065020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31152911" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "732189114" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31152911" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "732189114" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{570B1757-C702-11EF-ADF2-CAFD856C81B1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31152911" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{5708B4FB-C702-11EF-ADF2-CAFD856C81B1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "730626563" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{570D7A0F-C702-11EF-ADF2-CAFD856C81B1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31152911" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31152911" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "732345166" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31152911" IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 4212 WaterMark.exe 4212 WaterMark.exe 4212 WaterMark.exe 4212 WaterMark.exe 1556 WaterMark.exe 1556 WaterMark.exe 1556 WaterMark.exe 1556 WaterMark.exe 1156 WaterMark.exe 1156 WaterMark.exe 1156 WaterMark.exe 1156 WaterMark.exe 4212 WaterMark.exe 4212 WaterMark.exe 4212 WaterMark.exe 4212 WaterMark.exe 4212 WaterMark.exe 4212 WaterMark.exe 4212 WaterMark.exe 4212 WaterMark.exe 4212 WaterMark.exe 4212 WaterMark.exe 4212 WaterMark.exe 4212 WaterMark.exe 1556 WaterMark.exe 1556 WaterMark.exe 1556 WaterMark.exe 1556 WaterMark.exe 1556 WaterMark.exe 1556 WaterMark.exe 1556 WaterMark.exe 1556 WaterMark.exe 1556 WaterMark.exe 1556 WaterMark.exe 1556 WaterMark.exe 1556 WaterMark.exe 1156 WaterMark.exe 1156 WaterMark.exe 1156 WaterMark.exe 1156 WaterMark.exe 1156 WaterMark.exe 1156 WaterMark.exe 1156 WaterMark.exe 1156 WaterMark.exe 1156 WaterMark.exe 1156 WaterMark.exe 1156 WaterMark.exe 1156 WaterMark.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4212 WaterMark.exe Token: SeDebugPrivilege 1556 WaterMark.exe Token: SeDebugPrivilege 1156 WaterMark.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 4240 iexplore.exe 3328 iexplore.exe 2612 iexplore.exe 3964 iexplore.exe -
Suspicious use of SetWindowsHookEx 18 IoCs
pid Process 3328 iexplore.exe 3328 iexplore.exe 2612 iexplore.exe 2612 iexplore.exe 4240 iexplore.exe 4240 iexplore.exe 3964 iexplore.exe 3964 iexplore.exe 3968 IEXPLORE.EXE 3968 IEXPLORE.EXE 3288 IEXPLORE.EXE 3288 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 3680 IEXPLORE.EXE 3680 IEXPLORE.EXE 3968 IEXPLORE.EXE 3968 IEXPLORE.EXE -
Suspicious use of UnmapMainImage 6 IoCs
pid Process 1392 rundll32mgr.exe 2396 rundll32mgrmgr.exe 4212 WaterMark.exe 1556 WaterMark.exe 564 WaterMarkmgr.exe 1156 WaterMark.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3712 wrote to memory of 4780 3712 rundll32.exe 84 PID 3712 wrote to memory of 4780 3712 rundll32.exe 84 PID 3712 wrote to memory of 4780 3712 rundll32.exe 84 PID 4780 wrote to memory of 1392 4780 rundll32.exe 85 PID 4780 wrote to memory of 1392 4780 rundll32.exe 85 PID 4780 wrote to memory of 1392 4780 rundll32.exe 85 PID 1392 wrote to memory of 2396 1392 rundll32mgr.exe 86 PID 1392 wrote to memory of 2396 1392 rundll32mgr.exe 86 PID 1392 wrote to memory of 2396 1392 rundll32mgr.exe 86 PID 2396 wrote to memory of 4212 2396 rundll32mgrmgr.exe 88 PID 2396 wrote to memory of 4212 2396 rundll32mgrmgr.exe 88 PID 2396 wrote to memory of 4212 2396 rundll32mgrmgr.exe 88 PID 1392 wrote to memory of 1556 1392 rundll32mgr.exe 89 PID 1392 wrote to memory of 1556 1392 rundll32mgr.exe 89 PID 1392 wrote to memory of 1556 1392 rundll32mgr.exe 89 PID 4212 wrote to memory of 564 4212 WaterMark.exe 90 PID 4212 wrote to memory of 564 4212 WaterMark.exe 90 PID 4212 wrote to memory of 564 4212 WaterMark.exe 90 PID 4212 wrote to memory of 4924 4212 WaterMark.exe 91 PID 4212 wrote to memory of 4924 4212 WaterMark.exe 91 PID 4212 wrote to memory of 4924 4212 WaterMark.exe 91 PID 4212 wrote to memory of 4924 4212 WaterMark.exe 91 PID 4212 wrote to memory of 4924 4212 WaterMark.exe 91 PID 4212 wrote to memory of 4924 4212 WaterMark.exe 91 PID 4212 wrote to memory of 4924 4212 WaterMark.exe 91 PID 4212 wrote to memory of 4924 4212 WaterMark.exe 91 PID 4212 wrote to memory of 4924 4212 WaterMark.exe 91 PID 564 wrote to memory of 1156 564 WaterMarkmgr.exe 92 PID 564 wrote to memory of 1156 564 WaterMarkmgr.exe 92 PID 564 wrote to memory of 1156 564 WaterMarkmgr.exe 92 PID 1556 wrote to memory of 2636 1556 WaterMark.exe 93 PID 1556 wrote to memory of 2636 1556 WaterMark.exe 93 PID 1556 wrote to memory of 2636 1556 WaterMark.exe 93 PID 1556 wrote to memory of 2636 1556 WaterMark.exe 93 PID 1556 wrote to memory of 2636 1556 WaterMark.exe 93 PID 1556 wrote to memory of 2636 1556 WaterMark.exe 93 PID 1556 wrote to memory of 2636 1556 WaterMark.exe 93 PID 1556 wrote to memory of 2636 1556 WaterMark.exe 93 PID 1556 wrote to memory of 2636 1556 WaterMark.exe 93 PID 1156 wrote to memory of 4908 1156 WaterMark.exe 99 PID 1156 wrote to memory of 4908 1156 WaterMark.exe 99 PID 1156 wrote to memory of 4908 1156 WaterMark.exe 99 PID 1156 wrote to memory of 4908 1156 WaterMark.exe 99 PID 1156 wrote to memory of 4908 1156 WaterMark.exe 99 PID 1156 wrote to memory of 4908 1156 WaterMark.exe 99 PID 1156 wrote to memory of 4908 1156 WaterMark.exe 99 PID 1156 wrote to memory of 4908 1156 WaterMark.exe 99 PID 1156 wrote to memory of 4908 1156 WaterMark.exe 99 PID 4212 wrote to memory of 3328 4212 WaterMark.exe 103 PID 4212 wrote to memory of 3328 4212 WaterMark.exe 103 PID 4212 wrote to memory of 4240 4212 WaterMark.exe 104 PID 4212 wrote to memory of 4240 4212 WaterMark.exe 104 PID 1556 wrote to memory of 2612 1556 WaterMark.exe 105 PID 1556 wrote to memory of 2612 1556 WaterMark.exe 105 PID 1556 wrote to memory of 3964 1556 WaterMark.exe 106 PID 1556 wrote to memory of 3964 1556 WaterMark.exe 106 PID 2612 wrote to memory of 2740 2612 iexplore.exe 108 PID 2612 wrote to memory of 2740 2612 iexplore.exe 108 PID 2612 wrote to memory of 2740 2612 iexplore.exe 108 PID 3328 wrote to memory of 3288 3328 iexplore.exe 109 PID 3328 wrote to memory of 3288 3328 iexplore.exe 109 PID 3328 wrote to memory of 3288 3328 iexplore.exe 109 PID 4240 wrote to memory of 3968 4240 iexplore.exe 107 PID 4240 wrote to memory of 3968 4240 iexplore.exe 107
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ca4994d8a0dbdbc32bf29555473890fd6d535df4e88f8da49182e9ed3eb2cf14N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ca4994d8a0dbdbc32bf29555473890fd6d535df4e88f8da49182e9ed3eb2cf14N.dll,#12⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Windows\SysWOW64\rundll32mgrmgr.exeC:\Windows\SysWOW64\rundll32mgrmgr.exe4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Program Files (x86)\Microsoft\WaterMarkmgr.exe"C:\Program Files (x86)\Microsoft\WaterMarkmgr.exe"6⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"7⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe8⤵PID:4908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4908 -s 2049⤵
- Program crash
PID:3848
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
- Modifies Internet Explorer settings
PID:2608
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
- Modifies Internet Explorer settings
PID:4684
-
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe6⤵PID:4924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 2047⤵
- Program crash
PID:660
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3328 CREDAT:17410 /prefetch:27⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3288
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4240 CREDAT:17410 /prefetch:27⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3968
-
-
-
-
-
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe5⤵PID:2636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2636 -s 2046⤵
- Program crash
PID:2876
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2612 CREDAT:17410 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2740
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3964 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3964 CREDAT:17410 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3680
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4780 -s 6243⤵
- Program crash
PID:3360
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4780 -ip 47801⤵PID:3936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4924 -ip 49241⤵PID:4932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2636 -ip 26361⤵PID:5060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4908 -ip 49081⤵PID:1424
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5e5e877bcc2542ab8629d8f34bafcd7f4
SHA18f618efa1584268e9eafd2b01c2a2ac006113c01
SHA2565e63bcec102963b96b1f7d08ec512431a0ba748f90134dc51a05046296541e9e
SHA51279153f941ae2cc4a5649ac729f03dd3f98df24d5084e36d14467b2a859e6d63fc4167feac24e7b519a9e179fb243447fe6d09519169b11e3151d5cc467e4c9d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD5b9d24c5824099a392534f34934c71ad4
SHA12ee8eceba2ca9eb553512b4184c82a4f63d6e5b0
SHA2564d95b518039e1089571aa1732692d1c5c83b7e80641321cd31a63d1dc0b9662f
SHA5122ea0f91b4379b8f6147772e61d6daf298b821a4abdad35e767ae0692ff95146c5c2f940c4824458d2376e986db31028a76abeb688adea3f6ff5ecea1f14fedc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD5cd8046f2fc2c54106b1c21dbda37d3d9
SHA19330dabdc1c206f6f43e3a8ab595884735d76b22
SHA25676b1d16be8eead08bb57543e0df2675bcb993afdd97e1ec2aac185202f0258ee
SHA512acc82825889591b5cb35a12ce63e6128fa946730b55c8601841ee37b61defd04eaa32a5a2b417c8c7e26b79c9c3f91d7f5d699f67218917939bb6f4483ddd15f
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{570B1757-C702-11EF-ADF2-CAFD856C81B1}.dat
Filesize5KB
MD52a61eb84185df1d6819ebb19f0bba6d0
SHA17d6bb57ddf31fd0ec3787eeddc2be092c80cee12
SHA256ab6762ca2e4bdf445d257734366f423c2e24795f70be9de542c0c9d73e95f9e3
SHA512e4f2cb6e69c6906cd4181400fb4f955602d2bba516155fe19d1b7e15718fe883b19ab3eeeb87f904203719a00e8ce53863e30be54d9b2cb1fc20225cc96cad36
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{570B3E67-C702-11EF-ADF2-CAFD856C81B1}.dat
Filesize3KB
MD5173785a8ff9671e4c51c408577bdcd2e
SHA1e59afcfcc7849542bd1a64524083205b3f47d165
SHA256a423770035927a63eaf325102516d5a288c1c82891f89e65c65db4aeae2f2d72
SHA512b893e50aef4430e31e1d06e8f3bad279375d2fffa58806ac319f5561ee5073581786968ba5d65cf384240f11fc0b922ba89aadffb11663e9e2473f5f1b361034
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{570B3E67-C702-11EF-ADF2-CAFD856C81B1}.dat
Filesize5KB
MD599ee082ec8590388ab36d62df2112f1e
SHA16296752c7540a05645d2c20b5ad92da7afa0d1df
SHA256a16f273bcc5a8df4bc82b30622e8fade585bfc00d9654af81f6bc568c2cd7fe2
SHA5121da8679b352529acb607d43179c774ea0698407ed34a6eb0758cf40facc280316670dc93ad5758f500b628fa42b80f1f26834263449e560e56d15a8871acffc4
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{570D7A0F-C702-11EF-ADF2-CAFD856C81B1}.dat
Filesize3KB
MD5985d32e1b185cb3b62d72b523a837c7c
SHA1c9bacf82a4b7baf54cc6718c9ad9406bd4b6893a
SHA25648e934bf0f76de35dd6232c099a85028e714f0cc83df6d04672e1acb03a285dd
SHA512f3a9c6298b07dcdc3dc324b7e73cc3dee39abf3972f514b782c6a6607aa494f83906a6ccfd8c47931438454edde62679f7a6c94ad6fc3b1fe0e7db84c76d5c3b
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
233KB
MD57816267b885055210f56ea4fa2b6df2a
SHA19dffc3317e685cc65f3d458799ca7c36e4966a09
SHA256bcd868b32cb2e9954cbca19e2348653fa9cd5ad52b933c9a871dca6341733311
SHA51214c9d98ef827a5df6d99f4678d392da634a7200997b775f713d6f418f32ce2ae01197a6ef9003b6a52e11a539e32402edd9a9129a330523ae4b8d78f423050dc
-
Filesize
115KB
MD542772a782bb1c6444f6e4d4b5c51bed9
SHA157663c9f055ffc52d46b4dd2a91ffa8c191be33b
SHA256aac7bc007ae051fb71fb735ad4e92a6be8ec48ade1a3bf3b40746949a4dfd125
SHA512cb7cd3b5f18f1834b6eccf5be5858614b154ae8d146aa746dddc74bea14c7daf4a7833d3a9ed4f0d32c9821d85901f74a367a830d3b7f0bf379fa1fdd5fae6cf