Analysis
-
max time kernel
155s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 16:49
Static task
static1
Behavioral task
behavioral1
Sample
f55b7034dd092e4d44b112742b8befd57411a1c2db1e24ff91af30af06fd9f8b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f55b7034dd092e4d44b112742b8befd57411a1c2db1e24ff91af30af06fd9f8b.exe
Resource
win10v2004-20220812-en
General
-
Target
f55b7034dd092e4d44b112742b8befd57411a1c2db1e24ff91af30af06fd9f8b.exe
-
Size
248KB
-
MD5
ccc7c6fcb9230642ef152c74725e4531
-
SHA1
3de4a8cc41a8313a00bb5a0afbff360616098225
-
SHA256
f55b7034dd092e4d44b112742b8befd57411a1c2db1e24ff91af30af06fd9f8b
-
SHA512
78a24e70feec01457f6814c4470e32e398849ea8c46c3b26e1ea5d7d99f7a5410f7274bd2e59e22d4691e34eacbd10cb0fa471ee178426a54469992a15685a96
-
SSDEEP
6144:IQ/56UxwGQpNnVN8KqzeLM+8MvrLHHx5SQlibjXGWNkolay4p4bH8ed:iHpNnlPICrDS0ibLG/W
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" f55b7034dd092e4d44b112742b8befd57411a1c2db1e24ff91af30af06fd9f8b.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" woume.exe -
Executes dropped EXE 1 IoCs
pid Process 4340 woume.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation f55b7034dd092e4d44b112742b8befd57411a1c2db1e24ff91af30af06fd9f8b.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woume = "C:\\Users\\Admin\\woume.exe /x" woume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woume = "C:\\Users\\Admin\\woume.exe /g" woume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woume = "C:\\Users\\Admin\\woume.exe /Q" woume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woume = "C:\\Users\\Admin\\woume.exe /W" woume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woume = "C:\\Users\\Admin\\woume.exe /S" woume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woume = "C:\\Users\\Admin\\woume.exe /O" woume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woume = "C:\\Users\\Admin\\woume.exe /N" woume.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ woume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woume = "C:\\Users\\Admin\\woume.exe /t" woume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woume = "C:\\Users\\Admin\\woume.exe /I" woume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woume = "C:\\Users\\Admin\\woume.exe /H" woume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woume = "C:\\Users\\Admin\\woume.exe /Y" woume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woume = "C:\\Users\\Admin\\woume.exe /q" woume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woume = "C:\\Users\\Admin\\woume.exe /a" woume.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ f55b7034dd092e4d44b112742b8befd57411a1c2db1e24ff91af30af06fd9f8b.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woume = "C:\\Users\\Admin\\woume.exe /K" woume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woume = "C:\\Users\\Admin\\woume.exe /h" woume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woume = "C:\\Users\\Admin\\woume.exe /j" woume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woume = "C:\\Users\\Admin\\woume.exe /u" woume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woume = "C:\\Users\\Admin\\woume.exe /J" woume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woume = "C:\\Users\\Admin\\woume.exe /n" woume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woume = "C:\\Users\\Admin\\woume.exe /T" woume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woume = "C:\\Users\\Admin\\woume.exe /N" f55b7034dd092e4d44b112742b8befd57411a1c2db1e24ff91af30af06fd9f8b.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woume = "C:\\Users\\Admin\\woume.exe /V" woume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woume = "C:\\Users\\Admin\\woume.exe /L" woume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woume = "C:\\Users\\Admin\\woume.exe /A" woume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woume = "C:\\Users\\Admin\\woume.exe /y" woume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woume = "C:\\Users\\Admin\\woume.exe /Z" woume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woume = "C:\\Users\\Admin\\woume.exe /P" woume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woume = "C:\\Users\\Admin\\woume.exe /p" woume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woume = "C:\\Users\\Admin\\woume.exe /B" woume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woume = "C:\\Users\\Admin\\woume.exe /m" woume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woume = "C:\\Users\\Admin\\woume.exe /C" woume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woume = "C:\\Users\\Admin\\woume.exe /f" woume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woume = "C:\\Users\\Admin\\woume.exe /X" woume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woume = "C:\\Users\\Admin\\woume.exe /z" woume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woume = "C:\\Users\\Admin\\woume.exe /R" woume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woume = "C:\\Users\\Admin\\woume.exe /d" woume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woume = "C:\\Users\\Admin\\woume.exe /D" woume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woume = "C:\\Users\\Admin\\woume.exe /i" woume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woume = "C:\\Users\\Admin\\woume.exe /w" woume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woume = "C:\\Users\\Admin\\woume.exe /v" woume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woume = "C:\\Users\\Admin\\woume.exe /l" woume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woume = "C:\\Users\\Admin\\woume.exe /s" woume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woume = "C:\\Users\\Admin\\woume.exe /G" woume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woume = "C:\\Users\\Admin\\woume.exe /c" woume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woume = "C:\\Users\\Admin\\woume.exe /k" woume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woume = "C:\\Users\\Admin\\woume.exe /M" woume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woume = "C:\\Users\\Admin\\woume.exe /b" woume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woume = "C:\\Users\\Admin\\woume.exe /U" woume.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woume = "C:\\Users\\Admin\\woume.exe /e" woume.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4532 f55b7034dd092e4d44b112742b8befd57411a1c2db1e24ff91af30af06fd9f8b.exe 4532 f55b7034dd092e4d44b112742b8befd57411a1c2db1e24ff91af30af06fd9f8b.exe 4340 woume.exe 4340 woume.exe 4340 woume.exe 4340 woume.exe 4340 woume.exe 4340 woume.exe 4340 woume.exe 4340 woume.exe 4340 woume.exe 4340 woume.exe 4340 woume.exe 4340 woume.exe 4340 woume.exe 4340 woume.exe 4340 woume.exe 4340 woume.exe 4340 woume.exe 4340 woume.exe 4340 woume.exe 4340 woume.exe 4340 woume.exe 4340 woume.exe 4340 woume.exe 4340 woume.exe 4340 woume.exe 4340 woume.exe 4340 woume.exe 4340 woume.exe 4340 woume.exe 4340 woume.exe 4340 woume.exe 4340 woume.exe 4340 woume.exe 4340 woume.exe 4340 woume.exe 4340 woume.exe 4340 woume.exe 4340 woume.exe 4340 woume.exe 4340 woume.exe 4340 woume.exe 4340 woume.exe 4340 woume.exe 4340 woume.exe 4340 woume.exe 4340 woume.exe 4340 woume.exe 4340 woume.exe 4340 woume.exe 4340 woume.exe 4340 woume.exe 4340 woume.exe 4340 woume.exe 4340 woume.exe 4340 woume.exe 4340 woume.exe 4340 woume.exe 4340 woume.exe 4340 woume.exe 4340 woume.exe 4340 woume.exe 4340 woume.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4532 f55b7034dd092e4d44b112742b8befd57411a1c2db1e24ff91af30af06fd9f8b.exe 4340 woume.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4532 wrote to memory of 4340 4532 f55b7034dd092e4d44b112742b8befd57411a1c2db1e24ff91af30af06fd9f8b.exe 80 PID 4532 wrote to memory of 4340 4532 f55b7034dd092e4d44b112742b8befd57411a1c2db1e24ff91af30af06fd9f8b.exe 80 PID 4532 wrote to memory of 4340 4532 f55b7034dd092e4d44b112742b8befd57411a1c2db1e24ff91af30af06fd9f8b.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\f55b7034dd092e4d44b112742b8befd57411a1c2db1e24ff91af30af06fd9f8b.exe"C:\Users\Admin\AppData\Local\Temp\f55b7034dd092e4d44b112742b8befd57411a1c2db1e24ff91af30af06fd9f8b.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Users\Admin\woume.exe"C:\Users\Admin\woume.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4340
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
248KB
MD505f82bf037f6b5ad109a47b71d363ced
SHA12f4319ae6385113678f02436800e7fa53abe22e7
SHA256b5702991d31af352fc9d5f98c588945506db9b63eb68476ee874b4adaaf67c1e
SHA512000f36edc87579794f2c7c41658409497bdd14a92dce6795462743814567da666171407a854abd3d30c6114c75249b5798e903789560d77929fbbc434ce4953f
-
Filesize
248KB
MD505f82bf037f6b5ad109a47b71d363ced
SHA12f4319ae6385113678f02436800e7fa53abe22e7
SHA256b5702991d31af352fc9d5f98c588945506db9b63eb68476ee874b4adaaf67c1e
SHA512000f36edc87579794f2c7c41658409497bdd14a92dce6795462743814567da666171407a854abd3d30c6114c75249b5798e903789560d77929fbbc434ce4953f