Analysis
-
max time kernel
40s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03-10-2022 20:43
Static task
static1
Behavioral task
behavioral1
Sample
cd3045933d96b0bc6fca41c2e8df4367dabc23e8a5f7fbb2a3e399b892b3b52d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cd3045933d96b0bc6fca41c2e8df4367dabc23e8a5f7fbb2a3e399b892b3b52d.exe
Resource
win10v2004-20220812-en
General
-
Target
cd3045933d96b0bc6fca41c2e8df4367dabc23e8a5f7fbb2a3e399b892b3b52d.exe
-
Size
23KB
-
MD5
03250f6af647666a21b24e1136ac1e90
-
SHA1
a8c7a75959bf728af158f8c4454c2821fa6ef506
-
SHA256
cd3045933d96b0bc6fca41c2e8df4367dabc23e8a5f7fbb2a3e399b892b3b52d
-
SHA512
193258cec8fca0f1573696323f161be0456546e4a5532a3e432e4776419bdf1f758c1cd7ab75b0e451af0cccde86a056d2ca09c99d8993efa1ba562352106a20
-
SSDEEP
384:H+nJ9SCyR1kH+8Q+Wg8Hgl0fuwiR6hV8pBuGrkms+xngUIESuubqebx0ekOB6J5:H+nJ+16+7+8ASWwiR6f8buGNLxRIESJm
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\wbosakji.sys rundll32.exe -
Executes dropped EXE 1 IoCs
pid Process 944 woauolt.exe -
Sets file execution options in registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Thunder5.exe rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Thunder5.exe\Debugger = "svchost.exe" rundll32.exe -
Deletes itself 1 IoCs
pid Process 960 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 904 cd3045933d96b0bc6fca41c2e8df4367dabc23e8a5f7fbb2a3e399b892b3b52d.exe 904 cd3045933d96b0bc6fca41c2e8df4367dabc23e8a5f7fbb2a3e399b892b3b52d.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\361kary = "C:\\Windows\\system32\\woauolt.exe" woauolt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run cd3045933d96b0bc6fca41c2e8df4367dabc23e8a5f7fbb2a3e399b892b3b52d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\361kary = "C:\\Windows\\system32\\woauolt.exe" cd3045933d96b0bc6fca41c2e8df4367dabc23e8a5f7fbb2a3e399b892b3b52d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run woauolt.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\woauolt.exe cd3045933d96b0bc6fca41c2e8df4367dabc23e8a5f7fbb2a3e399b892b3b52d.exe File created C:\Windows\SysWOW64\woauolt.exe cd3045933d96b0bc6fca41c2e8df4367dabc23e8a5f7fbb2a3e399b892b3b52d.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\doscmda.dll cd3045933d96b0bc6fca41c2e8df4367dabc23e8a5f7fbb2a3e399b892b3b52d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 1424 cd3045933d96b0bc6fca41c2e8df4367dabc23e8a5f7fbb2a3e399b892b3b52d.exe 1424 cd3045933d96b0bc6fca41c2e8df4367dabc23e8a5f7fbb2a3e399b892b3b52d.exe 1424 cd3045933d96b0bc6fca41c2e8df4367dabc23e8a5f7fbb2a3e399b892b3b52d.exe 1424 cd3045933d96b0bc6fca41c2e8df4367dabc23e8a5f7fbb2a3e399b892b3b52d.exe 1340 rundll32.exe 904 cd3045933d96b0bc6fca41c2e8df4367dabc23e8a5f7fbb2a3e399b892b3b52d.exe 944 woauolt.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 1424 wrote to memory of 1340 1424 cd3045933d96b0bc6fca41c2e8df4367dabc23e8a5f7fbb2a3e399b892b3b52d.exe 26 PID 1424 wrote to memory of 1340 1424 cd3045933d96b0bc6fca41c2e8df4367dabc23e8a5f7fbb2a3e399b892b3b52d.exe 26 PID 1424 wrote to memory of 1340 1424 cd3045933d96b0bc6fca41c2e8df4367dabc23e8a5f7fbb2a3e399b892b3b52d.exe 26 PID 1424 wrote to memory of 1340 1424 cd3045933d96b0bc6fca41c2e8df4367dabc23e8a5f7fbb2a3e399b892b3b52d.exe 26 PID 1424 wrote to memory of 1340 1424 cd3045933d96b0bc6fca41c2e8df4367dabc23e8a5f7fbb2a3e399b892b3b52d.exe 26 PID 1424 wrote to memory of 1340 1424 cd3045933d96b0bc6fca41c2e8df4367dabc23e8a5f7fbb2a3e399b892b3b52d.exe 26 PID 1424 wrote to memory of 1340 1424 cd3045933d96b0bc6fca41c2e8df4367dabc23e8a5f7fbb2a3e399b892b3b52d.exe 26 PID 1424 wrote to memory of 904 1424 cd3045933d96b0bc6fca41c2e8df4367dabc23e8a5f7fbb2a3e399b892b3b52d.exe 27 PID 1424 wrote to memory of 904 1424 cd3045933d96b0bc6fca41c2e8df4367dabc23e8a5f7fbb2a3e399b892b3b52d.exe 27 PID 1424 wrote to memory of 904 1424 cd3045933d96b0bc6fca41c2e8df4367dabc23e8a5f7fbb2a3e399b892b3b52d.exe 27 PID 1424 wrote to memory of 904 1424 cd3045933d96b0bc6fca41c2e8df4367dabc23e8a5f7fbb2a3e399b892b3b52d.exe 27 PID 904 wrote to memory of 944 904 cd3045933d96b0bc6fca41c2e8df4367dabc23e8a5f7fbb2a3e399b892b3b52d.exe 28 PID 904 wrote to memory of 944 904 cd3045933d96b0bc6fca41c2e8df4367dabc23e8a5f7fbb2a3e399b892b3b52d.exe 28 PID 904 wrote to memory of 944 904 cd3045933d96b0bc6fca41c2e8df4367dabc23e8a5f7fbb2a3e399b892b3b52d.exe 28 PID 904 wrote to memory of 944 904 cd3045933d96b0bc6fca41c2e8df4367dabc23e8a5f7fbb2a3e399b892b3b52d.exe 28 PID 944 wrote to memory of 956 944 woauolt.exe 29 PID 944 wrote to memory of 956 944 woauolt.exe 29 PID 944 wrote to memory of 956 944 woauolt.exe 29 PID 944 wrote to memory of 956 944 woauolt.exe 29 PID 904 wrote to memory of 960 904 cd3045933d96b0bc6fca41c2e8df4367dabc23e8a5f7fbb2a3e399b892b3b52d.exe 30 PID 904 wrote to memory of 960 904 cd3045933d96b0bc6fca41c2e8df4367dabc23e8a5f7fbb2a3e399b892b3b52d.exe 30 PID 904 wrote to memory of 960 904 cd3045933d96b0bc6fca41c2e8df4367dabc23e8a5f7fbb2a3e399b892b3b52d.exe 30 PID 904 wrote to memory of 960 904 cd3045933d96b0bc6fca41c2e8df4367dabc23e8a5f7fbb2a3e399b892b3b52d.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd3045933d96b0bc6fca41c2e8df4367dabc23e8a5f7fbb2a3e399b892b3b52d.exe"C:\Users\Admin\AppData\Local\Temp\cd3045933d96b0bc6fca41c2e8df4367dabc23e8a5f7fbb2a3e399b892b3b52d.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\doscmda.dll MyEntryPoint2⤵
- Drops file in Drivers directory
- Sets file execution options in registry
- Suspicious behavior: EnumeratesProcesses
PID:1340
-
-
C:\Users\Admin\AppData\Local\Temp\cd3045933d96b0bc6fca41c2e8df4367dabc23e8a5f7fbb2a3e399b892b3b52d.exeC:\Users\Admin\AppData\Local\Temp\cd3045933d96b0bc6fca41c2e8df4367dabc23e8a5f7fbb2a3e399b892b3b52d.exe2⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\SysWOW64\woauolt.exeC:\Windows\system32\woauolt.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\SysWOW64\cmd.execmd /c del C:\Windows\system32\woauolt.exe4⤵PID:956
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c del C:\Users\Admin\AppData\Local\Temp\cd3045933d96b0bc6fca41c2e8df4367dabc23e8a5f7fbb2a3e399b892b3b52d.exe3⤵
- Deletes itself
PID:960
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD503250f6af647666a21b24e1136ac1e90
SHA1a8c7a75959bf728af158f8c4454c2821fa6ef506
SHA256cd3045933d96b0bc6fca41c2e8df4367dabc23e8a5f7fbb2a3e399b892b3b52d
SHA512193258cec8fca0f1573696323f161be0456546e4a5532a3e432e4776419bdf1f758c1cd7ab75b0e451af0cccde86a056d2ca09c99d8993efa1ba562352106a20
-
Filesize
23KB
MD503250f6af647666a21b24e1136ac1e90
SHA1a8c7a75959bf728af158f8c4454c2821fa6ef506
SHA256cd3045933d96b0bc6fca41c2e8df4367dabc23e8a5f7fbb2a3e399b892b3b52d
SHA512193258cec8fca0f1573696323f161be0456546e4a5532a3e432e4776419bdf1f758c1cd7ab75b0e451af0cccde86a056d2ca09c99d8993efa1ba562352106a20
-
Filesize
44KB
MD573b503a394b6250bac9a0295548bb51c
SHA13e8ffeba62243b7305baf6010e5782f3a84ddd13
SHA256d528004ba0b37aaef005d0972b6c71e2923712b3f3b43faa557d37f1a5ffcf78
SHA51232481a749962b440e181b1754e7d765c3e521692eda926ff1c390c0bdf16add5c329ddff14d4994ed5b0ad0dd26a5cb9abb322320d2621ab20107fedd5eeb97b
-
Filesize
23KB
MD503250f6af647666a21b24e1136ac1e90
SHA1a8c7a75959bf728af158f8c4454c2821fa6ef506
SHA256cd3045933d96b0bc6fca41c2e8df4367dabc23e8a5f7fbb2a3e399b892b3b52d
SHA512193258cec8fca0f1573696323f161be0456546e4a5532a3e432e4776419bdf1f758c1cd7ab75b0e451af0cccde86a056d2ca09c99d8993efa1ba562352106a20
-
Filesize
23KB
MD503250f6af647666a21b24e1136ac1e90
SHA1a8c7a75959bf728af158f8c4454c2821fa6ef506
SHA256cd3045933d96b0bc6fca41c2e8df4367dabc23e8a5f7fbb2a3e399b892b3b52d
SHA512193258cec8fca0f1573696323f161be0456546e4a5532a3e432e4776419bdf1f758c1cd7ab75b0e451af0cccde86a056d2ca09c99d8993efa1ba562352106a20