Analysis

  • max time kernel
    139s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    01-08-2024 20:59

Errors

Reason
Machine shutdown

General

  • Target

    WOMicClientSetup5_2.exe

  • Size

    1.4MB

  • MD5

    d8c68825b8a2cd1f00736b617240684c

  • SHA1

    7b68a0832785021e8883cec41606e60fa4a887e6

  • SHA256

    c7c7227a636b4c612cdf3f3d803be3ef1cf8f9aedad1c5d6620e0b9f6e0931a8

  • SHA512

    15f79655b8cfefa402aca135e900881b266f6de3f6f2ada63b59303c0a9efac0175fb253ed640a4cfc2888c5e6954ab24c7c54d4532ca56c3b0a90107af02b05

  • SSDEEP

    24576:Y12rpcEd5xQyaYXnCTZh5GYP7INP4w6ZtwZdsIAljoXHNAi7JYYDd+7PJms:QkzSy/nClDzBaZfuo3HYnPJd

Malware Config

Signatures

  • Drops file in Drivers directory 3 IoCs
  • Modifies Windows Firewall 2 TTPs 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 11 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 21 IoCs
  • Drops file in Program Files directory 12 IoCs
  • Drops file in Windows directory 15 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 12 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\WOMicClientSetup5_2.exe
    "C:\Users\Admin\AppData\Local\Temp\WOMicClientSetup5_2.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2388
    • C:\Windows\SysWOW64\netsh.exe
      C:\Windows\system32\netsh.exe advfirewall firewall add rule name="WOMic" profile=any dir=in action=allow program="C:\Program Files (x86)\WOMic\womicclient.exe" enable=yes protocol=UDP
      2⤵
      • Modifies Windows Firewall
      • Event Triggered Execution: Netsh Helper DLL
      • System Location Discovery: System Language Discovery
      PID:2072
    • C:\Windows\SysWOW64\netsh.exe
      C:\Windows\system32\netsh.exe advfirewall firewall add rule name="WOMic" profile=any dir=in action=allow program="C:\Program Files (x86)\WOMic\womicclient.exe" enable=yes protocol=TCP
      2⤵
      • Modifies Windows Firewall
      • Event Triggered Execution: Netsh Helper DLL
      • System Location Discovery: System Language Discovery
      PID:2948
    • C:\Windows\SysWOW64\netsh.exe
      C:\Windows\system32\netsh.exe advfirewall firewall add rule name="WOMic" profile=any dir=out action=allow program="C:\Program Files (x86)\WOMic\womicclient.exe" enable=yes protocol=UDP
      2⤵
      • Modifies Windows Firewall
      • Event Triggered Execution: Netsh Helper DLL
      • System Location Discovery: System Language Discovery
      PID:2984
    • C:\Windows\SysWOW64\netsh.exe
      C:\Windows\system32\netsh.exe advfirewall firewall add rule name="WOMic" profile=any dir=out action=allow program="C:\Program Files (x86)\WOMic\womicclient.exe" enable=yes protocol=TCP
      2⤵
      • Modifies Windows Firewall
      • Event Triggered Execution: Netsh Helper DLL
      • System Location Discovery: System Language Discovery
      PID:1332
    • C:\Program Files (x86)\WOMic\driver\devcon.exe
      devcon.exe install womic.inf *WOMic
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies system certificate store
      • Suspicious use of AdjustPrivilegeToken
      PID:1708
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{52bd6abd-d620-36d6-6e7e-ae2e07147534}\womic.inf" "9" "66d2d8b0f" "00000000000003D0" "WinSta0\Default" "0000000000000540" "208" "c:\program files (x86)\womic\driver"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1208
    • C:\Windows\system32\rundll32.exe
      rundll32.exe C:\Windows\system32\pnpui.dll,InstallSecurityPromptRunDllW 20 Global\{62950d28-de1f-675b-1958-0d0687618a3b} Global\{7c0f77ea-2a89-3877-8caa-5160c4951b79} C:\Windows\System32\DriverStore\Temp\{44a4ab95-0484-1736-8709-a176de01423a}\womic.inf C:\Windows\System32\DriverStore\Temp\{44a4ab95-0484-1736-8709-a176de01423a}\womic.cat
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2392
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2884
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000005FC" "00000000000005F8"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:2692
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "2" "211" "ROOT\MEDIA\0000" "C:\Windows\INF\oem2.inf" "womic.inf:StdMfg.ntAMD64:WOVAD_MicArray:1.5.0.0:*womic" "66d2d8b0f" "00000000000003D0" "00000000000005E8" "00000000000005F8"
    1⤵
    • Drops file in Drivers directory
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:2112
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0
    1⤵
      PID:2088
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x464
      1⤵
        PID:2036
      • C:\Windows\system32\LogonUI.exe
        "LogonUI.exe" /flags:0x1
        1⤵
          PID:944

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\WOMic\driver\womic.inf

          Filesize

          3KB

          MD5

          7816fb9c99e7ff44a83b9a96a47b1a5c

          SHA1

          9b074f5164afdeecb9ea8e9f6a41e10ce544f40d

          SHA256

          d3afeea6f65eed79f5eec12f17f8fe04ba6be586c58ae782f8609aec4eb21880

          SHA512

          7119e6ea308025ae2a2f646a1f33ff4cdf2b55adae0401a4725b7c054b57bbb6c3fcfff130fc9189f63ee59e107146df3335a90096867bac4c775c42927010ad

        • C:\Users\Admin\AppData\Local\Temp\CabB991.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\TarB9D3.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • C:\Users\Admin\AppData\Local\Temp\nsz368C.tmp\modern-wizard.bmp

          Filesize

          25KB

          MD5

          cbe40fd2b1ec96daedc65da172d90022

          SHA1

          366c216220aa4329dff6c485fd0e9b0f4f0a7944

          SHA256

          3ad2dc318056d0a2024af1804ea741146cfc18cc404649a44610cbf8b2056cf2

          SHA512

          62990cb16e37b6b4eff6ab03571c3a82dcaa21a1d393c3cb01d81f62287777fb0b4b27f8852b5fa71bc975feab5baa486d33f2c58660210e115de7e2bd34ea63

        • C:\Windows\System32\DriverStore\FileRepository\womic.inf_amd64_neutral_62656a62733f105e\womic.PNF

          Filesize

          10KB

          MD5

          6325b89e74b8744c1111bf0ab72dd431

          SHA1

          9f279e109bc0528f2bd3fdd51ed59f0458513d72

          SHA256

          30c8659b12fc38a60b73a851a8e1215979ab987d82909c38fe69ae2d686bffac

          SHA512

          bbec645d57df674006b174b6c05a340109944567ff4d04eb3057e15f73bfdd6e3bc0b63b3b2d3490680e8776c3bf8cc7fadfedc08f9a7a9a5762f60cf2faf875

        • C:\Windows\System32\DriverStore\INFCACHE.1

          Filesize

          1.4MB

          MD5

          948d5af33bedb7bd9e96d784fdf0905b

          SHA1

          9e89f6095f4695a3a75ebb49149c76438ac35839

          SHA256

          e56795948a151cb2b946e7bc84d83a9b808bec93f7f3a92a6f8e348654119459

          SHA512

          708c4b2599e333a078ac63903ac08b64ec07151714dee180b1afb1bce4df0ece56c046e55e2992ae5dbfbe317e8835ab38fe4d7b1948477e2a9d05a5424654af

        • C:\Windows\Temp\CabBE81.tmp

          Filesize

          29KB

          MD5

          d59a6b36c5a94916241a3ead50222b6f

          SHA1

          e274e9486d318c383bc4b9812844ba56f0cff3c6

          SHA256

          a38d01d3f024e626d579cf052ac3bd4260bb00c34bc6085977a5f4135ab09b53

          SHA512

          17012307955fef045e7c13bf0613bd40df27c29778ba6572640b76c18d379e02dc478e855c9276737363d0ad09b9a94f2adaa85da9c77ebb3c2d427aa68e2489

        • C:\Windows\Temp\TarBEF1.tmp

          Filesize

          81KB

          MD5

          b13f51572f55a2d31ed9f266d581e9ea

          SHA1

          7eef3111b878e159e520f34410ad87adecf0ca92

          SHA256

          725980edc240c928bec5a5f743fdabeee1692144da7091cf836dc7d0997cef15

          SHA512

          f437202723b2817f2fef64b53d4eb67f782bdc61884c0c1890b46deca7ca63313ee2ad093428481f94edfcecd9c77da6e72b604998f7d551af959dbd6915809c

        • \??\c:\PROGRA~2\womic\driver\womic.sys

          Filesize

          34KB

          MD5

          76d9773a3157af30c2132ef3d930f0a1

          SHA1

          668ace297f11387181e1a57d3d06bf09f8cde0d5

          SHA256

          209ca295ea914fdd233134b2295ae99bf743bef9b3d099a3b7925611e00703ca

          SHA512

          896dba2f5b2d7637f85097a6229fdacc89593bf58d09efdeba278ab5bc8b176cdf77d747a91305df84fd2d4ec19132650f5925f0831531b43431a9056a4b60d2

        • \??\c:\program files (x86)\womic\driver\womic.cat

          Filesize

          9KB

          MD5

          c9cdf651849371f2166b09247a26ee4f

          SHA1

          58d1d6135b5a14efdd5d2346e97e4dd60d77f9cb

          SHA256

          6220988d2a61d09556eb12ac7febe1ae8382eb1f7aa9c56e0a068774474ddcba

          SHA512

          c0b15210d2ad24cdfe743df1a87facdc502a89f030d7eb0d2d0fd47eb9291d147c1f026493ccf31d6f8966702d766ce3e1f178c3e7758207002c8debba5629a9

        • \Program Files (x86)\WOMic\WOMicClient.exe

          Filesize

          158KB

          MD5

          26ba164873f020120e2267ac1cf16d43

          SHA1

          9d8d69bbe7f37d9e359dc24459f2160b677566fe

          SHA256

          9e07dbce584991a821ea7030bc8228271d1d2aa8ce3d4bf8f1d2309796d7ebcf

          SHA512

          6d60ebf347aab27579d47c9a6e34d5035e70ae8e189ddd71c451c92387fc857c30a8b1ddae51c6fe19ce29070e1911480d680e5477fa02caf5072162ab00fedd

        • \Program Files (x86)\WOMic\driver\devcon.exe

          Filesize

          80KB

          MD5

          b9808a5cc368bd10a3a83af244285ac2

          SHA1

          ad3c0e42478a0d726b74925eb2a3c1d604bdcf3d

          SHA256

          7b76bac391c62c5884332bd606b6026aecba8ce57c919cc1f142ef2a052dbc08

          SHA512

          828e258a597b68e4a89a568a96beed71da32a0feb60dd6713ca2b1a25c2e534a83d93e6a29b7e4cb5e47658e14a1c23efab1f05d27c8e95af37d182428d863b7

        • \Program Files (x86)\WOMic\uninstall.exe

          Filesize

          72KB

          MD5

          24895e867ccadfd2fd03f49666bd15e2

          SHA1

          c366ef07243ee2a432c44a89c369bed751fb8731

          SHA256

          3504fb66da9eaf8911063a3bcddf7524b81ee4e183fbd336cab963de5fcd4d02

          SHA512

          69554a4e09c5b1b06f569e817f7f39c1bf32621af3e909eef2ff4ce6aea07cc9a9a0f333e6e18f7b7811d60789a9b78d7ed909f4aad2652e9f989e5fbd111873

        • \Users\Admin\AppData\Local\Temp\nsz368C.tmp\LangDLL.dll

          Filesize

          5KB

          MD5

          174708997758321cf926b69318c6c3f5

          SHA1

          645488089bf320f6864e0d0bc284c85216e56fbd

          SHA256

          f577b66492e97c7b8bf515398d8deb745abafd74f56fc03e67fce248ebbeb873

          SHA512

          214433597e04ca1ff9b4fe092d5d2997707a7c56f0f82c85d586088a200e4455028f3b9427d87b4f06f9252557d5be4b7a9138ea6a8d045df6209421fd8ca054

        • \Users\Admin\AppData\Local\Temp\nsz368C.tmp\System.dll

          Filesize

          11KB

          MD5

          0ff2d70cfdc8095ea99ca2dabbec3cd7

          SHA1

          10c51496d37cecd0e8a503a5a9bb2329d9b38116

          SHA256

          982c5fb7ada7d8c9bc3e419d1c35da6f05bc5dd845940c179af3a33d00a36a8b

          SHA512

          cb5fc0b3194f469b833c2c9abf493fcec5251e8609881b7f5e095b9bd09ed468168e95dda0ba415a7d8d6b7f0dee735467c0ed8e52b223eb5359986891ba6e2e

        • \Users\Admin\AppData\Local\Temp\nsz368C.tmp\nsDialogs.dll

          Filesize

          9KB

          MD5

          d6c3dd680c6467d07d730255d0ee5d87

          SHA1

          57e7a1d142032652256291b8ed2703b3dc1dfa9b

          SHA256

          aedb5122c12037bcf5c79c2197d1474e759cf47c67c37cdb21cf27428854a55b

          SHA512

          c28613d6d91c1f1f7951116f114da1c49e5f4994c855e522930bb4a8bdd73f12cadf1c6dcb84fc8d9f983ec60a40ac39522d3f86695e17ec88da4bd91c7b6a51

        • \Users\Admin\AppData\Local\Temp\nsz368C.tmp\nsExec.dll

          Filesize

          6KB

          MD5

          01e76fe9d2033606a48d4816bd9c2d9d

          SHA1

          e46d8a9ed4d5da220c81baf5f1fdb94708e9aba2

          SHA256

          ee052fd5141bf769b841846170aabf0d7c2bb922c74c623c3f109344534f7a70

          SHA512

          62ef7095d1bf53354c20329c2ce8546c277aa0e791839c8a24108a01f9483a953979259e0ad04dbcab966444ee7cdd340f8c9557bc8f98e9400794f2751dc7e0