Analysis Overview
SHA256
54e7eb310fbba8c3ad41bb284180f9839cd4a2436da36b33404fc04460c449a8
Threat Level: Known bad
The file WMI.exe was found to be: Known bad.
Malicious Activity Summary
Blackcat family
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2022-08-31 08:52
Signatures
Blackcat family
Analysis: behavioral5
Detonation Overview
Submitted
2022-08-31 08:52
Reported
2022-08-31 08:53
Platform
android-x64-arm64-20220823-en
Max time network
9s
Command Line
Signatures
Processes
Network
| Country | Destination | Domain | Proto |
| N/A | 224.0.0.251:5353 | udp | |
| US | 1.1.1.1:53 | android.apis.google.com | udp |
| US | 1.1.1.1:53 | android.apis.google.com | udp |
| US | 1.1.1.1:53 | android.apis.google.com | udp |
| NL | 172.217.168.206:443 | android.apis.google.com | tcp |
| NL | 142.251.36.46:443 | udp |
Files
Analysis: behavioral6
Detonation Overview
Submitted
2022-08-31 08:52
Reported
2022-08-31 08:55
Platform
macos-20220504-en
Max time kernel
89s
Max time network
72s
Command Line
Signatures
Processes
/bin/sh
[sh -c sudo /bin/zsh -c "/Users/run/WMI.exe"]
/bin/bash
[sh -c sudo /bin/zsh -c "/Users/run/WMI.exe"]
/bin/bash
[sh -c sudo /bin/zsh -c "/Users/run/WMI.exe"]
/usr/bin/sudo
[sudo /bin/zsh -c /Users/run/WMI.exe]
/usr/bin/sudo
[sudo /bin/zsh -c /Users/run/WMI.exe]
/usr/sbin/spctl
[/usr/sbin/spctl --status]
/bin/zsh
[/bin/zsh -c /Users/run/WMI.exe]
/bin/zsh
[/bin/zsh -c /Users/run/WMI.exe]
/Users/run/WMI.exe
[/Users/run/WMI.exe]
/Users/run/WMI.exe
[/Users/run/WMI.exe]
/usr/sbin/spctl
[/usr/sbin/spctl --test-devid-status]
/usr/bin/syslog
[/usr/bin/syslog -s -k com.apple.message.domain com.apple.security.assessment.current_state com.apple.message.signature assessments enabled com.apple.message.signature2 devid enabled Message Gatekeeper state assessments enabled/devid enabled]
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 11.courier-push-apple.com.akadns.net | udp |
| US | 8.8.8.8:53 | e673.dsce9.akamaiedge.net | udp |
| NL | 17.253.105.201:80 | valid.apple.com | tcp |
| US | 8.8.8.8:53 | itunes.apple.com | udp |
| NL | 104.81.140.28:443 | itunes.apple.com | tcp |
| US | 8.8.8.8:53 | certs.apple.com | udp |
| NL | 17.253.105.201:80 | certs.apple.com | tcp |
Files
Analysis: behavioral7
Detonation Overview
Submitted
2022-08-31 08:52
Reported
2022-08-31 08:53
Platform
ubuntu1804-amd64-en-20211208
Max time kernel
0s
Command Line
Signatures
Processes
/tmp/WMI.exe
[/tmp/WMI.exe]
Network
Files
Analysis: behavioral9
Detonation Overview
Submitted
2022-08-31 08:52
Reported
2022-08-31 08:53
Platform
debian9-mipsbe-en-20211208
Max time kernel
0s
Command Line
Signatures
Processes
/tmp/WMI.exe
[/tmp/WMI.exe]
Network
Files
Analysis: behavioral1
Detonation Overview
Submitted
2022-08-31 08:52
Reported
2022-08-31 08:54
Platform
win7-20220812-en
Max time kernel
43s
Max time network
49s
Command Line
Signatures
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 1728 wrote to memory of 2028 | N/A | C:\Windows\System32\control.exe | C:\Windows\system32\rundll32.exe |
| PID 1728 wrote to memory of 2028 | N/A | C:\Windows\System32\control.exe | C:\Windows\system32\rundll32.exe |
| PID 1728 wrote to memory of 2028 | N/A | C:\Windows\System32\control.exe | C:\Windows\system32\rundll32.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\WMI.exe
"C:\Users\Admin\AppData\Local\Temp\WMI.exe"
C:\Windows\System32\control.exe
"C:\Windows\System32\control.exe" "C:\Windows\system32\ncpa.cpl",
C:\Windows\system32\rundll32.exe
"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Windows\system32\ncpa.cpl",
Network
| Country | Destination | Domain | Proto |
| HK | 45.195.204.56:6464 | tcp |
Files
memory/1972-54-0x00000000761A1000-0x00000000761A3000-memory.dmp
memory/1728-55-0x000007FEFB941000-0x000007FEFB943000-memory.dmp
memory/2028-56-0x0000000000000000-mapping.dmp
Analysis: behavioral3
Detonation Overview
Submitted
2022-08-31 08:52
Reported
2022-08-31 08:53
Platform
android-x86-arm-20220823-en
Max time network
6s
Command Line
Signatures
Processes
Network
| Country | Destination | Domain | Proto |
| NL | 142.250.179.170:443 | tcp | |
| NL | 216.58.214.14:443 | udp | |
| N/A | 224.0.0.251:5353 | udp |
Files
Analysis: behavioral4
Detonation Overview
Submitted
2022-08-31 08:52
Reported
2022-08-31 08:53
Platform
android-x64-20220823-en
Max time network
7s
Command Line
Signatures
Processes
Network
| Country | Destination | Domain | Proto |
| N/A | 224.0.0.251:5353 | udp | |
| NL | 142.250.179.196:443 | udp | |
| NL | 142.250.179.196:443 | udp |
Files
Analysis: behavioral10
Detonation Overview
Submitted
2022-08-31 08:52
Reported
2022-08-31 08:53
Platform
debian9-mipsel-en-20211208
Max time kernel
0s
Command Line
Signatures
Processes
/tmp/WMI.exe
[/tmp/WMI.exe]
Network
Files
Analysis: behavioral2
Detonation Overview
Submitted
2022-08-31 08:52
Reported
2022-08-31 08:54
Platform
win10v2004-20220812-en
Max time kernel
76s
Max time network
81s
Command Line
Signatures
Processes
C:\Users\Admin\AppData\Local\Temp\WMI.exe
"C:\Users\Admin\AppData\Local\Temp\WMI.exe"
Network
| Country | Destination | Domain | Proto |
| NL | 95.101.78.82:80 | tcp | |
| US | 93.184.221.240:80 | tcp | |
| US | 93.184.220.29:80 | tcp | |
| US | 93.184.220.29:80 | tcp | |
| NL | 104.80.225.205:443 | tcp | |
| US | 93.184.221.240:80 | tcp |
Files
Analysis: behavioral8
Detonation Overview
Submitted
2022-08-31 08:52
Reported
2022-08-31 08:53
Platform
debian9-armhf-en-20211208
Max time kernel
0s
Command Line
Signatures
Processes
/tmp/WMI.exe
[/tmp/WMI.exe]