Analysis

  • max time kernel
    40s
  • max time network
    44s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03-10-2022 20:43

General

  • Target

    cd3045933d96b0bc6fca41c2e8df4367dabc23e8a5f7fbb2a3e399b892b3b52d.exe

  • Size

    23KB

  • MD5

    03250f6af647666a21b24e1136ac1e90

  • SHA1

    a8c7a75959bf728af158f8c4454c2821fa6ef506

  • SHA256

    cd3045933d96b0bc6fca41c2e8df4367dabc23e8a5f7fbb2a3e399b892b3b52d

  • SHA512

    193258cec8fca0f1573696323f161be0456546e4a5532a3e432e4776419bdf1f758c1cd7ab75b0e451af0cccde86a056d2ca09c99d8993efa1ba562352106a20

  • SSDEEP

    384:H+nJ9SCyR1kH+8Q+Wg8Hgl0fuwiR6hV8pBuGrkms+xngUIESuubqebx0ekOB6J5:H+nJ+16+7+8ASWwiR6f8buGNLxRIESJm

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Sets file execution options in registry 2 TTPs 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cd3045933d96b0bc6fca41c2e8df4367dabc23e8a5f7fbb2a3e399b892b3b52d.exe
    "C:\Users\Admin\AppData\Local\Temp\cd3045933d96b0bc6fca41c2e8df4367dabc23e8a5f7fbb2a3e399b892b3b52d.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1424
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\doscmda.dll MyEntryPoint
      2⤵
      • Drops file in Drivers directory
      • Sets file execution options in registry
      • Suspicious behavior: EnumeratesProcesses
      PID:1340
    • C:\Users\Admin\AppData\Local\Temp\cd3045933d96b0bc6fca41c2e8df4367dabc23e8a5f7fbb2a3e399b892b3b52d.exe
      C:\Users\Admin\AppData\Local\Temp\cd3045933d96b0bc6fca41c2e8df4367dabc23e8a5f7fbb2a3e399b892b3b52d.exe
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:904
      • C:\Windows\SysWOW64\woauolt.exe
        C:\Windows\system32\woauolt.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:944
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c del C:\Windows\system32\woauolt.exe
          4⤵
            PID:956
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c del C:\Users\Admin\AppData\Local\Temp\cd3045933d96b0bc6fca41c2e8df4367dabc23e8a5f7fbb2a3e399b892b3b52d.exe
          3⤵
          • Deletes itself
          PID:960

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\woauolt.exe

      Filesize

      23KB

      MD5

      03250f6af647666a21b24e1136ac1e90

      SHA1

      a8c7a75959bf728af158f8c4454c2821fa6ef506

      SHA256

      cd3045933d96b0bc6fca41c2e8df4367dabc23e8a5f7fbb2a3e399b892b3b52d

      SHA512

      193258cec8fca0f1573696323f161be0456546e4a5532a3e432e4776419bdf1f758c1cd7ab75b0e451af0cccde86a056d2ca09c99d8993efa1ba562352106a20

    • C:\Windows\SysWOW64\woauolt.exe

      Filesize

      23KB

      MD5

      03250f6af647666a21b24e1136ac1e90

      SHA1

      a8c7a75959bf728af158f8c4454c2821fa6ef506

      SHA256

      cd3045933d96b0bc6fca41c2e8df4367dabc23e8a5f7fbb2a3e399b892b3b52d

      SHA512

      193258cec8fca0f1573696323f161be0456546e4a5532a3e432e4776419bdf1f758c1cd7ab75b0e451af0cccde86a056d2ca09c99d8993efa1ba562352106a20

    • C:\Windows\doscmda.dll

      Filesize

      44KB

      MD5

      73b503a394b6250bac9a0295548bb51c

      SHA1

      3e8ffeba62243b7305baf6010e5782f3a84ddd13

      SHA256

      d528004ba0b37aaef005d0972b6c71e2923712b3f3b43faa557d37f1a5ffcf78

      SHA512

      32481a749962b440e181b1754e7d765c3e521692eda926ff1c390c0bdf16add5c329ddff14d4994ed5b0ad0dd26a5cb9abb322320d2621ab20107fedd5eeb97b

    • \Windows\SysWOW64\woauolt.exe

      Filesize

      23KB

      MD5

      03250f6af647666a21b24e1136ac1e90

      SHA1

      a8c7a75959bf728af158f8c4454c2821fa6ef506

      SHA256

      cd3045933d96b0bc6fca41c2e8df4367dabc23e8a5f7fbb2a3e399b892b3b52d

      SHA512

      193258cec8fca0f1573696323f161be0456546e4a5532a3e432e4776419bdf1f758c1cd7ab75b0e451af0cccde86a056d2ca09c99d8993efa1ba562352106a20

    • \Windows\SysWOW64\woauolt.exe

      Filesize

      23KB

      MD5

      03250f6af647666a21b24e1136ac1e90

      SHA1

      a8c7a75959bf728af158f8c4454c2821fa6ef506

      SHA256

      cd3045933d96b0bc6fca41c2e8df4367dabc23e8a5f7fbb2a3e399b892b3b52d

      SHA512

      193258cec8fca0f1573696323f161be0456546e4a5532a3e432e4776419bdf1f758c1cd7ab75b0e451af0cccde86a056d2ca09c99d8993efa1ba562352106a20

    • memory/1424-54-0x0000000076151000-0x0000000076153000-memory.dmp

      Filesize

      8KB