Analysis
-
max time kernel
94s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2025 14:48
Static task
static1
Behavioral task
behavioral1
Sample
778ca736990c712c5eb464234f1d05904fd75d969556ad9cbe262070d0352bda.exe
Resource
win7-20241023-en
General
-
Target
778ca736990c712c5eb464234f1d05904fd75d969556ad9cbe262070d0352bda.exe
-
Size
88KB
-
MD5
ef33fe40bcb4caac404839d83889f250
-
SHA1
002b7951e8e836f446dabd81cb894fa8b9e1b864
-
SHA256
778ca736990c712c5eb464234f1d05904fd75d969556ad9cbe262070d0352bda
-
SHA512
f58f9c4ec34e074305af7b13646a3887d986a673932ff7d4524bee1c23b630db638f09c395e2fb1c2a4811bb0d4fb46852f3422e556c271a447ec665f84cc087
-
SSDEEP
768:w06R0UKzOgnKqGR7//GPc0LOBhvBrHks3IiyhDYQbGmxlNaM+WGa1wuxnzgOYw9j:+R0vxn3Pc0LCH9MtbvabUDzJYWu3BE
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 1 IoCs
pid Process 3848 WaterMark.exe -
resource yara_rule behavioral2/memory/4004-9-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4004-10-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4004-12-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/3848-27-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/3848-26-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4004-7-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4004-5-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4004-4-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4004-3-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/3848-37-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/3848-39-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe 778ca736990c712c5eb464234f1d05904fd75d969556ad9cbe262070d0352bda.exe File opened for modification C:\Program Files (x86)\Microsoft\px9848.tmp 778ca736990c712c5eb464234f1d05904fd75d969556ad9cbe262070d0352bda.exe File created C:\Program Files (x86)\Microsoft\WaterMark.exe 778ca736990c712c5eb464234f1d05904fd75d969556ad9cbe262070d0352bda.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2536 628 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 778ca736990c712c5eb464234f1d05904fd75d969556ad9cbe262070d0352bda.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WaterMark.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1729258971" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31157066" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{92AB3C09-D73D-11EF-A7EA-F6235BFAC6D3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31157066" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "444149471" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31157066" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31157066" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1731914937" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1737071396" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{92B00219-D73D-11EF-A7EA-F6235BFAC6D3} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1729258971" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 3848 WaterMark.exe 3848 WaterMark.exe 3848 WaterMark.exe 3848 WaterMark.exe 3848 WaterMark.exe 3848 WaterMark.exe 3848 WaterMark.exe 3848 WaterMark.exe 3848 WaterMark.exe 3848 WaterMark.exe 3848 WaterMark.exe 3848 WaterMark.exe 3848 WaterMark.exe 3848 WaterMark.exe 3848 WaterMark.exe 3848 WaterMark.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3848 WaterMark.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 924 iexplore.exe 3440 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 924 iexplore.exe 924 iexplore.exe 3440 iexplore.exe 3440 iexplore.exe 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE 672 IEXPLORE.EXE 672 IEXPLORE.EXE 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4004 778ca736990c712c5eb464234f1d05904fd75d969556ad9cbe262070d0352bda.exe 3848 WaterMark.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 4004 wrote to memory of 3848 4004 778ca736990c712c5eb464234f1d05904fd75d969556ad9cbe262070d0352bda.exe 83 PID 4004 wrote to memory of 3848 4004 778ca736990c712c5eb464234f1d05904fd75d969556ad9cbe262070d0352bda.exe 83 PID 4004 wrote to memory of 3848 4004 778ca736990c712c5eb464234f1d05904fd75d969556ad9cbe262070d0352bda.exe 83 PID 3848 wrote to memory of 628 3848 WaterMark.exe 84 PID 3848 wrote to memory of 628 3848 WaterMark.exe 84 PID 3848 wrote to memory of 628 3848 WaterMark.exe 84 PID 3848 wrote to memory of 628 3848 WaterMark.exe 84 PID 3848 wrote to memory of 628 3848 WaterMark.exe 84 PID 3848 wrote to memory of 628 3848 WaterMark.exe 84 PID 3848 wrote to memory of 628 3848 WaterMark.exe 84 PID 3848 wrote to memory of 628 3848 WaterMark.exe 84 PID 3848 wrote to memory of 628 3848 WaterMark.exe 84 PID 3848 wrote to memory of 3440 3848 WaterMark.exe 89 PID 3848 wrote to memory of 3440 3848 WaterMark.exe 89 PID 3848 wrote to memory of 924 3848 WaterMark.exe 90 PID 3848 wrote to memory of 924 3848 WaterMark.exe 90 PID 3440 wrote to memory of 672 3440 iexplore.exe 93 PID 3440 wrote to memory of 672 3440 iexplore.exe 93 PID 3440 wrote to memory of 672 3440 iexplore.exe 93 PID 924 wrote to memory of 2388 924 iexplore.exe 92 PID 924 wrote to memory of 2388 924 iexplore.exe 92 PID 924 wrote to memory of 2388 924 iexplore.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\778ca736990c712c5eb464234f1d05904fd75d969556ad9cbe262070d0352bda.exe"C:\Users\Admin\AppData\Local\Temp\778ca736990c712c5eb464234f1d05904fd75d969556ad9cbe262070d0352bda.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3848 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 628 -s 2044⤵
- Program crash
PID:2536
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3440 CREDAT:17410 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:672
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:924 CREDAT:17410 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2388
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 628 -ip 6281⤵PID:2624
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD5ef33fe40bcb4caac404839d83889f250
SHA1002b7951e8e836f446dabd81cb894fa8b9e1b864
SHA256778ca736990c712c5eb464234f1d05904fd75d969556ad9cbe262070d0352bda
SHA512f58f9c4ec34e074305af7b13646a3887d986a673932ff7d4524bee1c23b630db638f09c395e2fb1c2a4811bb0d4fb46852f3422e556c271a447ec665f84cc087
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD50ada2095c461df5a751955aa41dd491e
SHA18366c54b31e1ddc8016aa22aab8c83f73c690810
SHA25680cd542688ed3a45669b53243c3f4922d6eb21a34d8dfeebc6c101484d3bac09
SHA512135991affe343d4358bb15a693effa7a6813d6715e555729d2aa04a98555e13fded55d3100a41a92a5beb57c68fbdacb199a3e66407944e37880b28d42d79e7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD558c02ebaa5ec530fbd365dd2db258ca4
SHA1d1ac476792a33fefccb92b94514851fc8306e333
SHA2563367eacf22f361d0af259df1ff44a7fb0f1186ca54080c02e6cf3b143bc22418
SHA5125ceaa01c6cff3431c63babcada51c3da9ae7fadeca8787c199178443a233f4fb0d59f85d09b0fd669fe850bbd7a7ace5b6075e72899a68ede4f5a15cd82a554e
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{92AB3C09-D73D-11EF-A7EA-F6235BFAC6D3}.dat
Filesize3KB
MD58cae65e954aff8ddb37871e35e13d158
SHA118ca7b0ae69ecb4ed11845e792e88150bbabc9c0
SHA256108b95718124128d440e65c64f272833d73513d34a50aa8e1f23ebb794ae7096
SHA51282002e3d4b8b793cddadfecbd2844718f1c61edf4ba2b0ef097b8f9ff7a183cc323a2f742d669a6abc75b3fd8410612416bc18a15fb9255bc4b333660ac2033c
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{92B00219-D73D-11EF-A7EA-F6235BFAC6D3}.dat
Filesize5KB
MD5127545f577608c54e3636aba41a3e6c7
SHA19c30560c96047bf368b070c73936ff733f2609c1
SHA256e2689943d0d3adef9a02539a411d1711bdf909524669fa021195ce20f72f2357
SHA5128ebdf1ad5d5a2068074f2f84a2b5ef6c74c3af7928721d546d860648723e3d0c2879563f768586253000e05c323161470c653d05f9680da0efdedc057f2bf784
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee