Analysis

  • max time kernel
    37s
  • max time network
    40s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-07-2024 19:25

Errors

Reason
Machine shutdown

General

  • Target

    WOMicClientSetup5_2.exe

  • Size

    1.4MB

  • MD5

    d8c68825b8a2cd1f00736b617240684c

  • SHA1

    7b68a0832785021e8883cec41606e60fa4a887e6

  • SHA256

    c7c7227a636b4c612cdf3f3d803be3ef1cf8f9aedad1c5d6620e0b9f6e0931a8

  • SHA512

    15f79655b8cfefa402aca135e900881b266f6de3f6f2ada63b59303c0a9efac0175fb253ed640a4cfc2888c5e6954ab24c7c54d4532ca56c3b0a90107af02b05

  • SSDEEP

    24576:Y12rpcEd5xQyaYXnCTZh5GYP7INP4w6ZtwZdsIAljoXHNAi7JYYDd+7PJms:QkzSy/nClDzBaZfuo3HYnPJd

Malware Config

Signatures

  • Drops file in Drivers directory 5 IoCs
  • Modifies Windows Firewall 2 TTPs 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 7 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 16 IoCs
  • Drops file in Program Files directory 12 IoCs
  • Drops file in Windows directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 12 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Checks SCSI registry key(s) 3 TTPs 62 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 56 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\WOMicClientSetup5_2.exe
    "C:\Users\Admin\AppData\Local\Temp\WOMicClientSetup5_2.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1980
    • C:\Windows\SysWOW64\netsh.exe
      C:\Windows\system32\netsh.exe advfirewall firewall add rule name="WOMic" profile=any dir=in action=allow program="C:\Program Files (x86)\WOMic\womicclient.exe" enable=yes protocol=UDP
      2⤵
      • Modifies Windows Firewall
      • Event Triggered Execution: Netsh Helper DLL
      PID:1240
    • C:\Windows\SysWOW64\netsh.exe
      C:\Windows\system32\netsh.exe advfirewall firewall add rule name="WOMic" profile=any dir=in action=allow program="C:\Program Files (x86)\WOMic\womicclient.exe" enable=yes protocol=TCP
      2⤵
      • Modifies Windows Firewall
      • Event Triggered Execution: Netsh Helper DLL
      PID:4472
    • C:\Windows\SysWOW64\netsh.exe
      C:\Windows\system32\netsh.exe advfirewall firewall add rule name="WOMic" profile=any dir=out action=allow program="C:\Program Files (x86)\WOMic\womicclient.exe" enable=yes protocol=UDP
      2⤵
      • Modifies Windows Firewall
      • Event Triggered Execution: Netsh Helper DLL
      PID:4000
    • C:\Windows\SysWOW64\netsh.exe
      C:\Windows\system32\netsh.exe advfirewall firewall add rule name="WOMic" profile=any dir=out action=allow program="C:\Program Files (x86)\WOMic\womicclient.exe" enable=yes protocol=TCP
      2⤵
      • Modifies Windows Firewall
      • Event Triggered Execution: Netsh Helper DLL
      PID:372
    • C:\Program Files (x86)\WOMic\driver\devcon.exe
      devcon.exe install womic.inf Root\WOMic
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:2892
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall
    1⤵
    • Drops file in Windows directory
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4320
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{6f653f9d-d666-ff4f-b692-e891f2a831a9}\womic.inf" "9" "46d27e6e7" "000000000000014C" "WinSta0\Default" "000000000000015C" "208" "c:\program files (x86)\womic\driver"
      2⤵
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Checks SCSI registry key(s)
      • Modifies data under HKEY_USERS
      PID:2880
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "2" "211" "ROOT\MEDIA\0000" "C:\Windows\INF\oem3.inf" "oem3.inf:ed86ca11fdcda04c:InstallWOMic:2.1.0.0:root\womic," "46d27e6e7" "000000000000014C"
      2⤵
      • Drops file in Drivers directory
      • Drops file in Windows directory
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:1332
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x4 /state0:0xa3952855 /state1:0x41c64e6d
    1⤵
    • Modifies data under HKEY_USERS
    • Suspicious use of SetWindowsHookEx
    PID:868

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\WOMic\WOMicClient.exe

    Filesize

    158KB

    MD5

    26ba164873f020120e2267ac1cf16d43

    SHA1

    9d8d69bbe7f37d9e359dc24459f2160b677566fe

    SHA256

    9e07dbce584991a821ea7030bc8228271d1d2aa8ce3d4bf8f1d2309796d7ebcf

    SHA512

    6d60ebf347aab27579d47c9a6e34d5035e70ae8e189ddd71c451c92387fc857c30a8b1ddae51c6fe19ce29070e1911480d680e5477fa02caf5072162ab00fedd

  • C:\Program Files (x86)\WOMic\driver\devcon.exe

    Filesize

    80KB

    MD5

    b9808a5cc368bd10a3a83af244285ac2

    SHA1

    ad3c0e42478a0d726b74925eb2a3c1d604bdcf3d

    SHA256

    7b76bac391c62c5884332bd606b6026aecba8ce57c919cc1f142ef2a052dbc08

    SHA512

    828e258a597b68e4a89a568a96beed71da32a0feb60dd6713ca2b1a25c2e534a83d93e6a29b7e4cb5e47658e14a1c23efab1f05d27c8e95af37d182428d863b7

  • C:\Program Files (x86)\WOMic\driver\womic.inf

    Filesize

    5KB

    MD5

    c32cee4c141ee4c679211964c309dbef

    SHA1

    51719da535dd835d99cfbd07364622a52594846e

    SHA256

    8f2f3339a3cfd98742295b9c5864ce40922c1f6c783aaf70ce31a8defc720764

    SHA512

    8546859bb3afbd2a005a17b366bf0b0e5b8d5a8a8b927a2834e8464070d2a9c92885e16e1aa4b08e072dd268c3be275dbbb139b308580343ff28b96406dc6e84

  • C:\Users\Admin\AppData\Local\Temp\nskAD67.tmp\LangDLL.dll

    Filesize

    5KB

    MD5

    174708997758321cf926b69318c6c3f5

    SHA1

    645488089bf320f6864e0d0bc284c85216e56fbd

    SHA256

    f577b66492e97c7b8bf515398d8deb745abafd74f56fc03e67fce248ebbeb873

    SHA512

    214433597e04ca1ff9b4fe092d5d2997707a7c56f0f82c85d586088a200e4455028f3b9427d87b4f06f9252557d5be4b7a9138ea6a8d045df6209421fd8ca054

  • C:\Users\Admin\AppData\Local\Temp\nskAD67.tmp\System.dll

    Filesize

    11KB

    MD5

    0ff2d70cfdc8095ea99ca2dabbec3cd7

    SHA1

    10c51496d37cecd0e8a503a5a9bb2329d9b38116

    SHA256

    982c5fb7ada7d8c9bc3e419d1c35da6f05bc5dd845940c179af3a33d00a36a8b

    SHA512

    cb5fc0b3194f469b833c2c9abf493fcec5251e8609881b7f5e095b9bd09ed468168e95dda0ba415a7d8d6b7f0dee735467c0ed8e52b223eb5359986891ba6e2e

  • C:\Users\Admin\AppData\Local\Temp\nskAD67.tmp\modern-wizard.bmp

    Filesize

    25KB

    MD5

    cbe40fd2b1ec96daedc65da172d90022

    SHA1

    366c216220aa4329dff6c485fd0e9b0f4f0a7944

    SHA256

    3ad2dc318056d0a2024af1804ea741146cfc18cc404649a44610cbf8b2056cf2

    SHA512

    62990cb16e37b6b4eff6ab03571c3a82dcaa21a1d393c3cb01d81f62287777fb0b4b27f8852b5fa71bc975feab5baa486d33f2c58660210e115de7e2bd34ea63

  • C:\Users\Admin\AppData\Local\Temp\nskAD67.tmp\nsDialogs.dll

    Filesize

    9KB

    MD5

    d6c3dd680c6467d07d730255d0ee5d87

    SHA1

    57e7a1d142032652256291b8ed2703b3dc1dfa9b

    SHA256

    aedb5122c12037bcf5c79c2197d1474e759cf47c67c37cdb21cf27428854a55b

    SHA512

    c28613d6d91c1f1f7951116f114da1c49e5f4994c855e522930bb4a8bdd73f12cadf1c6dcb84fc8d9f983ec60a40ac39522d3f86695e17ec88da4bd91c7b6a51

  • C:\Users\Admin\AppData\Local\Temp\nskAD67.tmp\nsExec.dll

    Filesize

    6KB

    MD5

    01e76fe9d2033606a48d4816bd9c2d9d

    SHA1

    e46d8a9ed4d5da220c81baf5f1fdb94708e9aba2

    SHA256

    ee052fd5141bf769b841846170aabf0d7c2bb922c74c623c3f109344534f7a70

    SHA512

    62ef7095d1bf53354c20329c2ce8546c277aa0e791839c8a24108a01f9483a953979259e0ad04dbcab966444ee7cdd340f8c9557bc8f98e9400794f2751dc7e0

  • \??\c:\PROGRA~2\womic\driver\womic.sys

    Filesize

    49KB

    MD5

    dcf7f591c326a86495f8a6fd031f4e96

    SHA1

    fc1b06b1b9efec95e9d4907d8964a485e45ca4c3

    SHA256

    75f080f206ff0c13701ff66388c4a404529d9ec71b2ba0f1fadd4b71481c0475

    SHA512

    c0a4b5fd18fad13831885c257b46ba27451e8b89eff2089234b26b5330b093b9574f910857b1b95668d59ca98584db83b03c2481fa1b74074ff1afc0eddac806

  • \??\c:\program files (x86)\womic\driver\womic.cat

    Filesize

    10KB

    MD5

    9a7ecc72e00b9e2dc24fd8d88c52ef38

    SHA1

    12d7457beb4945b9a7e89afc00fe560e3af737a8

    SHA256

    24ae3420b9ef53b55b6d5da957b11fdd526d35c28033fc967ea27155b374d200

    SHA512

    6a11bdd10d6a0b96e4d5ecbaa46c91c7e094855dc09728cd8f56c25debefa6bd4fbae7451047dfd5c8242007d9f7934771da346f0f5d602a56e0680f2409095e