Analysis
-
max time kernel
149s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 02:19
Static task
static1
Behavioral task
behavioral1
Sample
4c44c56b871c9fba88d77acab86ce647.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4c44c56b871c9fba88d77acab86ce647.exe
Resource
win10v2004-20231215-en
General
-
Target
4c44c56b871c9fba88d77acab86ce647.exe
-
Size
294KB
-
MD5
4c44c56b871c9fba88d77acab86ce647
-
SHA1
f3d166cd1d3230cd67b306a97f7d4dafe300c771
-
SHA256
150fb07d25c5963ed127b5565365c7b3c4fd94383794d11af5058f47932b53bb
-
SHA512
c9749626fb74797b2532d044c6078e6797874d47d2e19c1140499b4580489c3552bc5c7688c050694b8a229afa69ff361eb95e0724816f772493bf24fabdd3bb
-
SSDEEP
6144:7iGtsLLAlqNC+C+1PTG/qm/PgCnmUSFMhl4ii+M/oI29XqKs:WGtsLUt+L1PTEn/iUSFM8P+rI2ds
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2644 womyve.exe -
Loads dropped DLL 2 IoCs
pid Process 1672 4c44c56b871c9fba88d77acab86ce647.exe 1672 4c44c56b871c9fba88d77acab86ce647.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\{99FD42C8-CEFB-AD4E-9644-6D1A8CD24E07} = "C:\\Users\\Admin\\AppData\\Roaming\\Kedyt\\womyve.exe" womyve.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1672 set thread context of 2140 1672 4c44c56b871c9fba88d77acab86ce647.exe 14 -
Program crash 1 IoCs
pid pid_target Process procid_target 1280 2140 WerFault.exe 14 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Privacy 4c44c56b871c9fba88d77acab86ce647.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 4c44c56b871c9fba88d77acab86ce647.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2644 womyve.exe 2644 womyve.exe 2644 womyve.exe 2644 womyve.exe 2644 womyve.exe 2644 womyve.exe 2644 womyve.exe 2644 womyve.exe 2644 womyve.exe 2644 womyve.exe 2644 womyve.exe 2644 womyve.exe 2644 womyve.exe 2644 womyve.exe 2644 womyve.exe 2644 womyve.exe 2644 womyve.exe 2644 womyve.exe 2644 womyve.exe 2644 womyve.exe 2644 womyve.exe 2644 womyve.exe 2644 womyve.exe 2644 womyve.exe 2644 womyve.exe 2644 womyve.exe 2644 womyve.exe 2644 womyve.exe 2644 womyve.exe 2644 womyve.exe 2644 womyve.exe 2644 womyve.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1672 4c44c56b871c9fba88d77acab86ce647.exe 2644 womyve.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 1672 wrote to memory of 2644 1672 4c44c56b871c9fba88d77acab86ce647.exe 17 PID 1672 wrote to memory of 2644 1672 4c44c56b871c9fba88d77acab86ce647.exe 17 PID 1672 wrote to memory of 2644 1672 4c44c56b871c9fba88d77acab86ce647.exe 17 PID 1672 wrote to memory of 2644 1672 4c44c56b871c9fba88d77acab86ce647.exe 17 PID 2644 wrote to memory of 1068 2644 womyve.exe 26 PID 2644 wrote to memory of 1068 2644 womyve.exe 26 PID 2644 wrote to memory of 1068 2644 womyve.exe 26 PID 2644 wrote to memory of 1068 2644 womyve.exe 26 PID 2644 wrote to memory of 1068 2644 womyve.exe 26 PID 2644 wrote to memory of 1100 2644 womyve.exe 25 PID 2644 wrote to memory of 1100 2644 womyve.exe 25 PID 2644 wrote to memory of 1100 2644 womyve.exe 25 PID 2644 wrote to memory of 1100 2644 womyve.exe 25 PID 2644 wrote to memory of 1100 2644 womyve.exe 25 PID 2644 wrote to memory of 1132 2644 womyve.exe 24 PID 2644 wrote to memory of 1132 2644 womyve.exe 24 PID 2644 wrote to memory of 1132 2644 womyve.exe 24 PID 2644 wrote to memory of 1132 2644 womyve.exe 24 PID 2644 wrote to memory of 1132 2644 womyve.exe 24 PID 2644 wrote to memory of 1584 2644 womyve.exe 22 PID 2644 wrote to memory of 1584 2644 womyve.exe 22 PID 2644 wrote to memory of 1584 2644 womyve.exe 22 PID 2644 wrote to memory of 1584 2644 womyve.exe 22 PID 2644 wrote to memory of 1584 2644 womyve.exe 22 PID 2644 wrote to memory of 1672 2644 womyve.exe 18 PID 2644 wrote to memory of 1672 2644 womyve.exe 18 PID 2644 wrote to memory of 1672 2644 womyve.exe 18 PID 2644 wrote to memory of 1672 2644 womyve.exe 18 PID 2644 wrote to memory of 1672 2644 womyve.exe 18 PID 1672 wrote to memory of 2140 1672 4c44c56b871c9fba88d77acab86ce647.exe 14 PID 1672 wrote to memory of 2140 1672 4c44c56b871c9fba88d77acab86ce647.exe 14 PID 1672 wrote to memory of 2140 1672 4c44c56b871c9fba88d77acab86ce647.exe 14 PID 1672 wrote to memory of 2140 1672 4c44c56b871c9fba88d77acab86ce647.exe 14 PID 1672 wrote to memory of 2140 1672 4c44c56b871c9fba88d77acab86ce647.exe 14 PID 1672 wrote to memory of 2140 1672 4c44c56b871c9fba88d77acab86ce647.exe 14 PID 1672 wrote to memory of 2140 1672 4c44c56b871c9fba88d77acab86ce647.exe 14 PID 1672 wrote to memory of 2140 1672 4c44c56b871c9fba88d77acab86ce647.exe 14 PID 1672 wrote to memory of 2140 1672 4c44c56b871c9fba88d77acab86ce647.exe 14 PID 2140 wrote to memory of 1280 2140 cmd.exe 15 PID 2140 wrote to memory of 1280 2140 cmd.exe 15 PID 2140 wrote to memory of 1280 2140 cmd.exe 15 PID 2140 wrote to memory of 1280 2140 cmd.exe 15 PID 2644 wrote to memory of 2288 2644 womyve.exe 16 PID 2644 wrote to memory of 2288 2644 womyve.exe 16 PID 2644 wrote to memory of 2288 2644 womyve.exe 16 PID 2644 wrote to memory of 2288 2644 womyve.exe 16 PID 2644 wrote to memory of 2288 2644 womyve.exe 16 PID 2644 wrote to memory of 1280 2644 womyve.exe 15 PID 2644 wrote to memory of 1280 2644 womyve.exe 15 PID 2644 wrote to memory of 1280 2644 womyve.exe 15 PID 2644 wrote to memory of 1280 2644 womyve.exe 15 PID 2644 wrote to memory of 1280 2644 womyve.exe 15
Processes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp69045907.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2140 -s 1122⤵
- Program crash
PID:1280
-
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "18199338561775221038-246517608-1688683689-116789589810484447711104970589-1671849638"1⤵PID:2288
-
C:\Users\Admin\AppData\Roaming\Kedyt\womyve.exe"C:\Users\Admin\AppData\Roaming\Kedyt\womyve.exe"1⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2644
-
C:\Users\Admin\AppData\Local\Temp\4c44c56b871c9fba88d77acab86ce647.exe"C:\Users\Admin\AppData\Local\Temp\4c44c56b871c9fba88d77acab86ce647.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1672
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1584
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1132
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1100
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1068
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
294KB
MD536901d2986af3b3e371681db42234929
SHA1bf38512f25f92b90398447df857a408fd11fa209
SHA256c81862cbb4bdf5251065b2816b57541292b7f634a47ffa0654f42de1eb01d7cd
SHA512b8c55496b91ca8fb66705ba0601dc5fa4b46d4d6a752ec22ba4cbccfd024b334e355e65c37ee7627f2068d0d4c8572565b903647f708256783d4e0d13f269ca2