Analysis

  • max time kernel
    22s
  • max time network
    24s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    06-07-2024 19:25

Errors

Reason
Machine shutdown

General

  • Target

    WOMicClientSetup5_2.exe

  • Size

    1.4MB

  • MD5

    d8c68825b8a2cd1f00736b617240684c

  • SHA1

    7b68a0832785021e8883cec41606e60fa4a887e6

  • SHA256

    c7c7227a636b4c612cdf3f3d803be3ef1cf8f9aedad1c5d6620e0b9f6e0931a8

  • SHA512

    15f79655b8cfefa402aca135e900881b266f6de3f6f2ada63b59303c0a9efac0175fb253ed640a4cfc2888c5e6954ab24c7c54d4532ca56c3b0a90107af02b05

  • SSDEEP

    24576:Y12rpcEd5xQyaYXnCTZh5GYP7INP4w6ZtwZdsIAljoXHNAi7JYYDd+7PJms:QkzSy/nClDzBaZfuo3HYnPJd

Malware Config

Signatures

  • Drops file in Drivers directory 3 IoCs
  • Modifies Windows Firewall 2 TTPs 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 11 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 21 IoCs
  • Drops file in Program Files directory 12 IoCs
  • Drops file in Windows directory 15 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 12 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\WOMicClientSetup5_2.exe
    "C:\Users\Admin\AppData\Local\Temp\WOMicClientSetup5_2.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:2228
    • C:\Windows\SysWOW64\netsh.exe
      C:\Windows\system32\netsh.exe advfirewall firewall add rule name="WOMic" profile=any dir=in action=allow program="C:\Program Files (x86)\WOMic\womicclient.exe" enable=yes protocol=UDP
      2⤵
      • Modifies Windows Firewall
      • Event Triggered Execution: Netsh Helper DLL
      PID:2864
    • C:\Windows\SysWOW64\netsh.exe
      C:\Windows\system32\netsh.exe advfirewall firewall add rule name="WOMic" profile=any dir=in action=allow program="C:\Program Files (x86)\WOMic\womicclient.exe" enable=yes protocol=TCP
      2⤵
      • Modifies Windows Firewall
      • Event Triggered Execution: Netsh Helper DLL
      PID:2020
    • C:\Windows\SysWOW64\netsh.exe
      C:\Windows\system32\netsh.exe advfirewall firewall add rule name="WOMic" profile=any dir=out action=allow program="C:\Program Files (x86)\WOMic\womicclient.exe" enable=yes protocol=UDP
      2⤵
      • Modifies Windows Firewall
      • Event Triggered Execution: Netsh Helper DLL
      PID:2636
    • C:\Windows\SysWOW64\netsh.exe
      C:\Windows\system32\netsh.exe advfirewall firewall add rule name="WOMic" profile=any dir=out action=allow program="C:\Program Files (x86)\WOMic\womicclient.exe" enable=yes protocol=TCP
      2⤵
      • Modifies Windows Firewall
      • Event Triggered Execution: Netsh Helper DLL
      PID:2768
    • C:\Program Files (x86)\WOMic\driver\devcon.exe
      devcon.exe install womic.inf *WOMic
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies system certificate store
      • Suspicious use of AdjustPrivilegeToken
      PID:1988
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{0e6f6870-29b5-5c4a-f098-153e1953445f}\womic.inf" "9" "66d2d8b0f" "00000000000002C8" "WinSta0\Default" "0000000000000584" "208" "c:\program files (x86)\womic\driver"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:836
    • C:\Windows\system32\rundll32.exe
      rundll32.exe C:\Windows\system32\pnpui.dll,InstallSecurityPromptRunDllW 20 Global\{5c31ee9d-b2cc-5194-18a3-643bad387d04} Global\{05e87d4f-0746-6799-ff73-bf5c8a79bc73} C:\Windows\System32\DriverStore\Temp\{5cf0f22e-dffd-5404-ee3d-e70bdbabfc6d}\womic.inf C:\Windows\System32\DriverStore\Temp\{5cf0f22e-dffd-5404-ee3d-e70bdbabfc6d}\womic.cat
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1500
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:772
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000005DC" "0000000000000068"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:2336
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "2" "211" "ROOT\MEDIA\0000" "C:\Windows\INF\oem2.inf" "womic.inf:StdMfg.ntAMD64:WOVAD_MicArray:1.5.0.0:*womic" "66d2d8b0f" "00000000000002C8" "00000000000005C8" "0000000000000068"
    1⤵
    • Drops file in Drivers directory
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:2876
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0
    1⤵
      PID:580
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x1
      1⤵
        PID:988

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\WOMic\driver\womic.inf

        Filesize

        3KB

        MD5

        7816fb9c99e7ff44a83b9a96a47b1a5c

        SHA1

        9b074f5164afdeecb9ea8e9f6a41e10ce544f40d

        SHA256

        d3afeea6f65eed79f5eec12f17f8fe04ba6be586c58ae782f8609aec4eb21880

        SHA512

        7119e6ea308025ae2a2f646a1f33ff4cdf2b55adae0401a4725b7c054b57bbb6c3fcfff130fc9189f63ee59e107146df3335a90096867bac4c775c42927010ad

      • C:\Users\Admin\AppData\Local\Temp\CabBFD8.tmp

        Filesize

        70KB

        MD5

        49aebf8cbd62d92ac215b2923fb1b9f5

        SHA1

        1723be06719828dda65ad804298d0431f6aff976

        SHA256

        b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

        SHA512

        bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

      • C:\Users\Admin\AppData\Local\Temp\TarC00A.tmp

        Filesize

        181KB

        MD5

        4ea6026cf93ec6338144661bf1202cd1

        SHA1

        a1dec9044f750ad887935a01430bf49322fbdcb7

        SHA256

        8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

        SHA512

        6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

      • C:\Users\Admin\AppData\Local\Temp\nsoAE79.tmp\modern-wizard.bmp

        Filesize

        25KB

        MD5

        cbe40fd2b1ec96daedc65da172d90022

        SHA1

        366c216220aa4329dff6c485fd0e9b0f4f0a7944

        SHA256

        3ad2dc318056d0a2024af1804ea741146cfc18cc404649a44610cbf8b2056cf2

        SHA512

        62990cb16e37b6b4eff6ab03571c3a82dcaa21a1d393c3cb01d81f62287777fb0b4b27f8852b5fa71bc975feab5baa486d33f2c58660210e115de7e2bd34ea63

      • C:\Windows\System32\DriverStore\FileRepository\womic.inf_amd64_neutral_62656a62733f105e\womic.PNF

        Filesize

        10KB

        MD5

        07fff0fcd50eb4d77fb5e939eea7783e

        SHA1

        ef47725acff4dc9a68870c514a22d272749bddd9

        SHA256

        862dc499677c38a8784f0ba1fb78b381175635c90f949657ae2a1b57c9beb4ab

        SHA512

        65eb64f920e89f041ae7e65aa11e4392b5ac306c100d90f42b36a3be6ea01785394c57e4ca20b30c0781b4a0fa23468c978f466ff5d0cfea93d4f24e0908cb02

      • C:\Windows\System32\DriverStore\INFCACHE.1

        Filesize

        1.4MB

        MD5

        5a3cf60415c7f1edac0e237463e16692

        SHA1

        3fc1f9cd72e67f74fd6fafc29bdde545fa5d5fd3

        SHA256

        ec8d7e429d255516cd14b196406018b686e02f64aa1a4133e6072bf9e6e6c790

        SHA512

        42a570bf025518df4c14c01609c887ce028a32ca2b99beb652e68b325427314b3ffc6e090a444f6bf621e3297cb3317dd89b9e39b11ed6ff44ec9f0f2c5f792a

      • C:\Windows\Temp\CabC19C.tmp

        Filesize

        29KB

        MD5

        d59a6b36c5a94916241a3ead50222b6f

        SHA1

        e274e9486d318c383bc4b9812844ba56f0cff3c6

        SHA256

        a38d01d3f024e626d579cf052ac3bd4260bb00c34bc6085977a5f4135ab09b53

        SHA512

        17012307955fef045e7c13bf0613bd40df27c29778ba6572640b76c18d379e02dc478e855c9276737363d0ad09b9a94f2adaa85da9c77ebb3c2d427aa68e2489

      • C:\Windows\Temp\TarC1AF.tmp

        Filesize

        81KB

        MD5

        b13f51572f55a2d31ed9f266d581e9ea

        SHA1

        7eef3111b878e159e520f34410ad87adecf0ca92

        SHA256

        725980edc240c928bec5a5f743fdabeee1692144da7091cf836dc7d0997cef15

        SHA512

        f437202723b2817f2fef64b53d4eb67f782bdc61884c0c1890b46deca7ca63313ee2ad093428481f94edfcecd9c77da6e72b604998f7d551af959dbd6915809c

      • \??\c:\PROGRA~2\womic\driver\womic.sys

        Filesize

        34KB

        MD5

        76d9773a3157af30c2132ef3d930f0a1

        SHA1

        668ace297f11387181e1a57d3d06bf09f8cde0d5

        SHA256

        209ca295ea914fdd233134b2295ae99bf743bef9b3d099a3b7925611e00703ca

        SHA512

        896dba2f5b2d7637f85097a6229fdacc89593bf58d09efdeba278ab5bc8b176cdf77d747a91305df84fd2d4ec19132650f5925f0831531b43431a9056a4b60d2

      • \??\c:\program files (x86)\womic\driver\womic.cat

        Filesize

        9KB

        MD5

        c9cdf651849371f2166b09247a26ee4f

        SHA1

        58d1d6135b5a14efdd5d2346e97e4dd60d77f9cb

        SHA256

        6220988d2a61d09556eb12ac7febe1ae8382eb1f7aa9c56e0a068774474ddcba

        SHA512

        c0b15210d2ad24cdfe743df1a87facdc502a89f030d7eb0d2d0fd47eb9291d147c1f026493ccf31d6f8966702d766ce3e1f178c3e7758207002c8debba5629a9

      • \Program Files (x86)\WOMic\WOMicClient.exe

        Filesize

        158KB

        MD5

        26ba164873f020120e2267ac1cf16d43

        SHA1

        9d8d69bbe7f37d9e359dc24459f2160b677566fe

        SHA256

        9e07dbce584991a821ea7030bc8228271d1d2aa8ce3d4bf8f1d2309796d7ebcf

        SHA512

        6d60ebf347aab27579d47c9a6e34d5035e70ae8e189ddd71c451c92387fc857c30a8b1ddae51c6fe19ce29070e1911480d680e5477fa02caf5072162ab00fedd

      • \Program Files (x86)\WOMic\driver\devcon.exe

        Filesize

        80KB

        MD5

        b9808a5cc368bd10a3a83af244285ac2

        SHA1

        ad3c0e42478a0d726b74925eb2a3c1d604bdcf3d

        SHA256

        7b76bac391c62c5884332bd606b6026aecba8ce57c919cc1f142ef2a052dbc08

        SHA512

        828e258a597b68e4a89a568a96beed71da32a0feb60dd6713ca2b1a25c2e534a83d93e6a29b7e4cb5e47658e14a1c23efab1f05d27c8e95af37d182428d863b7

      • \Program Files (x86)\WOMic\uninstall.exe

        Filesize

        72KB

        MD5

        24895e867ccadfd2fd03f49666bd15e2

        SHA1

        c366ef07243ee2a432c44a89c369bed751fb8731

        SHA256

        3504fb66da9eaf8911063a3bcddf7524b81ee4e183fbd336cab963de5fcd4d02

        SHA512

        69554a4e09c5b1b06f569e817f7f39c1bf32621af3e909eef2ff4ce6aea07cc9a9a0f333e6e18f7b7811d60789a9b78d7ed909f4aad2652e9f989e5fbd111873

      • \Users\Admin\AppData\Local\Temp\nsoAE79.tmp\LangDLL.dll

        Filesize

        5KB

        MD5

        174708997758321cf926b69318c6c3f5

        SHA1

        645488089bf320f6864e0d0bc284c85216e56fbd

        SHA256

        f577b66492e97c7b8bf515398d8deb745abafd74f56fc03e67fce248ebbeb873

        SHA512

        214433597e04ca1ff9b4fe092d5d2997707a7c56f0f82c85d586088a200e4455028f3b9427d87b4f06f9252557d5be4b7a9138ea6a8d045df6209421fd8ca054

      • \Users\Admin\AppData\Local\Temp\nsoAE79.tmp\System.dll

        Filesize

        11KB

        MD5

        0ff2d70cfdc8095ea99ca2dabbec3cd7

        SHA1

        10c51496d37cecd0e8a503a5a9bb2329d9b38116

        SHA256

        982c5fb7ada7d8c9bc3e419d1c35da6f05bc5dd845940c179af3a33d00a36a8b

        SHA512

        cb5fc0b3194f469b833c2c9abf493fcec5251e8609881b7f5e095b9bd09ed468168e95dda0ba415a7d8d6b7f0dee735467c0ed8e52b223eb5359986891ba6e2e

      • \Users\Admin\AppData\Local\Temp\nsoAE79.tmp\nsDialogs.dll

        Filesize

        9KB

        MD5

        d6c3dd680c6467d07d730255d0ee5d87

        SHA1

        57e7a1d142032652256291b8ed2703b3dc1dfa9b

        SHA256

        aedb5122c12037bcf5c79c2197d1474e759cf47c67c37cdb21cf27428854a55b

        SHA512

        c28613d6d91c1f1f7951116f114da1c49e5f4994c855e522930bb4a8bdd73f12cadf1c6dcb84fc8d9f983ec60a40ac39522d3f86695e17ec88da4bd91c7b6a51

      • \Users\Admin\AppData\Local\Temp\nsoAE79.tmp\nsExec.dll

        Filesize

        6KB

        MD5

        01e76fe9d2033606a48d4816bd9c2d9d

        SHA1

        e46d8a9ed4d5da220c81baf5f1fdb94708e9aba2

        SHA256

        ee052fd5141bf769b841846170aabf0d7c2bb922c74c623c3f109344534f7a70

        SHA512

        62ef7095d1bf53354c20329c2ce8546c277aa0e791839c8a24108a01f9483a953979259e0ad04dbcab966444ee7cdd340f8c9557bc8f98e9400794f2751dc7e0