Analysis

  • max time kernel
    69s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    25/08/2024, 17:57

General

  • Target

    WOMicClientSetup5_2.exe

  • Size

    1.4MB

  • MD5

    d8c68825b8a2cd1f00736b617240684c

  • SHA1

    7b68a0832785021e8883cec41606e60fa4a887e6

  • SHA256

    c7c7227a636b4c612cdf3f3d803be3ef1cf8f9aedad1c5d6620e0b9f6e0931a8

  • SHA512

    15f79655b8cfefa402aca135e900881b266f6de3f6f2ada63b59303c0a9efac0175fb253ed640a4cfc2888c5e6954ab24c7c54d4532ca56c3b0a90107af02b05

  • SSDEEP

    24576:Y12rpcEd5xQyaYXnCTZh5GYP7INP4w6ZtwZdsIAljoXHNAi7JYYDd+7PJms:QkzSy/nClDzBaZfuo3HYnPJd

Malware Config

Signatures

  • Drops file in Drivers directory 3 IoCs
  • Modifies Windows Firewall 2 TTPs 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 11 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 21 IoCs
  • Drops file in Program Files directory 12 IoCs
  • Drops file in Windows directory 15 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 12 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\WOMicClientSetup5_2.exe
    "C:\Users\Admin\AppData\Local\Temp\WOMicClientSetup5_2.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1928
    • C:\Windows\SysWOW64\netsh.exe
      C:\Windows\system32\netsh.exe advfirewall firewall add rule name="WOMic" profile=any dir=in action=allow program="C:\Program Files (x86)\WOMic\womicclient.exe" enable=yes protocol=UDP
      2⤵
      • Modifies Windows Firewall
      • Event Triggered Execution: Netsh Helper DLL
      • System Location Discovery: System Language Discovery
      PID:2712
    • C:\Windows\SysWOW64\netsh.exe
      C:\Windows\system32\netsh.exe advfirewall firewall add rule name="WOMic" profile=any dir=in action=allow program="C:\Program Files (x86)\WOMic\womicclient.exe" enable=yes protocol=TCP
      2⤵
      • Modifies Windows Firewall
      • Event Triggered Execution: Netsh Helper DLL
      • System Location Discovery: System Language Discovery
      PID:2500
    • C:\Windows\SysWOW64\netsh.exe
      C:\Windows\system32\netsh.exe advfirewall firewall add rule name="WOMic" profile=any dir=out action=allow program="C:\Program Files (x86)\WOMic\womicclient.exe" enable=yes protocol=UDP
      2⤵
      • Modifies Windows Firewall
      • Event Triggered Execution: Netsh Helper DLL
      • System Location Discovery: System Language Discovery
      PID:2808
    • C:\Windows\SysWOW64\netsh.exe
      C:\Windows\system32\netsh.exe advfirewall firewall add rule name="WOMic" profile=any dir=out action=allow program="C:\Program Files (x86)\WOMic\womicclient.exe" enable=yes protocol=TCP
      2⤵
      • Modifies Windows Firewall
      • Event Triggered Execution: Netsh Helper DLL
      • System Location Discovery: System Language Discovery
      PID:1728
    • C:\Program Files (x86)\WOMic\driver\devcon.exe
      devcon.exe install womic.inf *WOMic
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies system certificate store
      • Suspicious use of AdjustPrivilegeToken
      PID:2160
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{1d201a02-7967-4dbf-8747-bb7bf2a8671a}\womic.inf" "9" "66d2d8b0f" "00000000000004C4" "WinSta0\Default" "00000000000004A0" "208" "c:\program files (x86)\womic\driver"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2644
    • C:\Windows\system32\rundll32.exe
      rundll32.exe C:\Windows\system32\pnpui.dll,InstallSecurityPromptRunDllW 20 Global\{35ada56e-5751-22a7-2b7b-2e2c859d4572} Global\{103bdc0d-0926-5c70-05f3-c7158a81e254} C:\Windows\System32\DriverStore\Temp\{141f8eee-7091-0100-4406-70621c7ebb0c}\womic.inf C:\Windows\System32\DriverStore\Temp\{141f8eee-7091-0100-4406-70621c7ebb0c}\womic.cat
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1044
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:744
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000003A0" "00000000000005A4"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:2080
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "2" "211" "ROOT\MEDIA\0000" "C:\Windows\INF\oem2.inf" "womic.inf:StdMfg.ntAMD64:WOVAD_MicArray:1.5.0.0:*womic" "66d2d8b0f" "00000000000005D8" "000000000000005C" "00000000000005E4"
    1⤵
    • Drops file in Drivers directory
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:2904

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\WOMic\driver\womic.inf

    Filesize

    3KB

    MD5

    7816fb9c99e7ff44a83b9a96a47b1a5c

    SHA1

    9b074f5164afdeecb9ea8e9f6a41e10ce544f40d

    SHA256

    d3afeea6f65eed79f5eec12f17f8fe04ba6be586c58ae782f8609aec4eb21880

    SHA512

    7119e6ea308025ae2a2f646a1f33ff4cdf2b55adae0401a4725b7c054b57bbb6c3fcfff130fc9189f63ee59e107146df3335a90096867bac4c775c42927010ad

  • C:\Users\Admin\AppData\Local\Temp\Cab732F.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar7342.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\nstB54C.tmp\modern-wizard.bmp

    Filesize

    25KB

    MD5

    cbe40fd2b1ec96daedc65da172d90022

    SHA1

    366c216220aa4329dff6c485fd0e9b0f4f0a7944

    SHA256

    3ad2dc318056d0a2024af1804ea741146cfc18cc404649a44610cbf8b2056cf2

    SHA512

    62990cb16e37b6b4eff6ab03571c3a82dcaa21a1d393c3cb01d81f62287777fb0b4b27f8852b5fa71bc975feab5baa486d33f2c58660210e115de7e2bd34ea63

  • C:\Windows\System32\DriverStore\FileRepository\womic.inf_amd64_neutral_62656a62733f105e\womic.PNF

    Filesize

    10KB

    MD5

    662e6488a42ab497a14a45fa3f4a30ce

    SHA1

    e6113a58c79d7827a32164eb89f291ab686a8b9b

    SHA256

    c6352b3114f217390a6534737d66fed1683f3a19262583a5a73d5becaead9460

    SHA512

    00d68f0561d84cf89219a8b5cbc4af1e194134e4cb1e9d1157285a80a7e13da3acf77fef7809105f0ffefd97dc95a4dd356916d9a69d410d35a40ef323841614

  • C:\Windows\System32\DriverStore\INFCACHE.1

    Filesize

    1.4MB

    MD5

    ced4c943e489d074585fac03b177b21f

    SHA1

    77ee0c33d37f8218b671c9c65cbbebabefe0becd

    SHA256

    34b24fcf661b7048b13e0cba8ae167fc70dadda19018f9f1a3296ee1f0116184

    SHA512

    6e691e1876a471d27cdc4a0157817ae4ae65a5b6e304d79a02925e03ca3ee86486542ae5811e0ad3c2881cd2b45a9c6f9647f610b5a7befe8bfe3ee25830f162

  • C:\Windows\Temp\Cab73FA.tmp

    Filesize

    29KB

    MD5

    d59a6b36c5a94916241a3ead50222b6f

    SHA1

    e274e9486d318c383bc4b9812844ba56f0cff3c6

    SHA256

    a38d01d3f024e626d579cf052ac3bd4260bb00c34bc6085977a5f4135ab09b53

    SHA512

    17012307955fef045e7c13bf0613bd40df27c29778ba6572640b76c18d379e02dc478e855c9276737363d0ad09b9a94f2adaa85da9c77ebb3c2d427aa68e2489

  • C:\Windows\Temp\Tar740C.tmp

    Filesize

    81KB

    MD5

    b13f51572f55a2d31ed9f266d581e9ea

    SHA1

    7eef3111b878e159e520f34410ad87adecf0ca92

    SHA256

    725980edc240c928bec5a5f743fdabeee1692144da7091cf836dc7d0997cef15

    SHA512

    f437202723b2817f2fef64b53d4eb67f782bdc61884c0c1890b46deca7ca63313ee2ad093428481f94edfcecd9c77da6e72b604998f7d551af959dbd6915809c

  • \??\c:\PROGRA~2\womic\driver\womic.sys

    Filesize

    34KB

    MD5

    76d9773a3157af30c2132ef3d930f0a1

    SHA1

    668ace297f11387181e1a57d3d06bf09f8cde0d5

    SHA256

    209ca295ea914fdd233134b2295ae99bf743bef9b3d099a3b7925611e00703ca

    SHA512

    896dba2f5b2d7637f85097a6229fdacc89593bf58d09efdeba278ab5bc8b176cdf77d747a91305df84fd2d4ec19132650f5925f0831531b43431a9056a4b60d2

  • \??\c:\program files (x86)\womic\driver\womic.cat

    Filesize

    9KB

    MD5

    c9cdf651849371f2166b09247a26ee4f

    SHA1

    58d1d6135b5a14efdd5d2346e97e4dd60d77f9cb

    SHA256

    6220988d2a61d09556eb12ac7febe1ae8382eb1f7aa9c56e0a068774474ddcba

    SHA512

    c0b15210d2ad24cdfe743df1a87facdc502a89f030d7eb0d2d0fd47eb9291d147c1f026493ccf31d6f8966702d766ce3e1f178c3e7758207002c8debba5629a9

  • \Program Files (x86)\WOMic\WOMicClient.exe

    Filesize

    158KB

    MD5

    26ba164873f020120e2267ac1cf16d43

    SHA1

    9d8d69bbe7f37d9e359dc24459f2160b677566fe

    SHA256

    9e07dbce584991a821ea7030bc8228271d1d2aa8ce3d4bf8f1d2309796d7ebcf

    SHA512

    6d60ebf347aab27579d47c9a6e34d5035e70ae8e189ddd71c451c92387fc857c30a8b1ddae51c6fe19ce29070e1911480d680e5477fa02caf5072162ab00fedd

  • \Program Files (x86)\WOMic\driver\devcon.exe

    Filesize

    80KB

    MD5

    b9808a5cc368bd10a3a83af244285ac2

    SHA1

    ad3c0e42478a0d726b74925eb2a3c1d604bdcf3d

    SHA256

    7b76bac391c62c5884332bd606b6026aecba8ce57c919cc1f142ef2a052dbc08

    SHA512

    828e258a597b68e4a89a568a96beed71da32a0feb60dd6713ca2b1a25c2e534a83d93e6a29b7e4cb5e47658e14a1c23efab1f05d27c8e95af37d182428d863b7

  • \Program Files (x86)\WOMic\uninstall.exe

    Filesize

    72KB

    MD5

    24895e867ccadfd2fd03f49666bd15e2

    SHA1

    c366ef07243ee2a432c44a89c369bed751fb8731

    SHA256

    3504fb66da9eaf8911063a3bcddf7524b81ee4e183fbd336cab963de5fcd4d02

    SHA512

    69554a4e09c5b1b06f569e817f7f39c1bf32621af3e909eef2ff4ce6aea07cc9a9a0f333e6e18f7b7811d60789a9b78d7ed909f4aad2652e9f989e5fbd111873

  • \Users\Admin\AppData\Local\Temp\nstB54C.tmp\LangDLL.dll

    Filesize

    5KB

    MD5

    174708997758321cf926b69318c6c3f5

    SHA1

    645488089bf320f6864e0d0bc284c85216e56fbd

    SHA256

    f577b66492e97c7b8bf515398d8deb745abafd74f56fc03e67fce248ebbeb873

    SHA512

    214433597e04ca1ff9b4fe092d5d2997707a7c56f0f82c85d586088a200e4455028f3b9427d87b4f06f9252557d5be4b7a9138ea6a8d045df6209421fd8ca054

  • \Users\Admin\AppData\Local\Temp\nstB54C.tmp\System.dll

    Filesize

    11KB

    MD5

    0ff2d70cfdc8095ea99ca2dabbec3cd7

    SHA1

    10c51496d37cecd0e8a503a5a9bb2329d9b38116

    SHA256

    982c5fb7ada7d8c9bc3e419d1c35da6f05bc5dd845940c179af3a33d00a36a8b

    SHA512

    cb5fc0b3194f469b833c2c9abf493fcec5251e8609881b7f5e095b9bd09ed468168e95dda0ba415a7d8d6b7f0dee735467c0ed8e52b223eb5359986891ba6e2e

  • \Users\Admin\AppData\Local\Temp\nstB54C.tmp\nsDialogs.dll

    Filesize

    9KB

    MD5

    d6c3dd680c6467d07d730255d0ee5d87

    SHA1

    57e7a1d142032652256291b8ed2703b3dc1dfa9b

    SHA256

    aedb5122c12037bcf5c79c2197d1474e759cf47c67c37cdb21cf27428854a55b

    SHA512

    c28613d6d91c1f1f7951116f114da1c49e5f4994c855e522930bb4a8bdd73f12cadf1c6dcb84fc8d9f983ec60a40ac39522d3f86695e17ec88da4bd91c7b6a51

  • \Users\Admin\AppData\Local\Temp\nstB54C.tmp\nsExec.dll

    Filesize

    6KB

    MD5

    01e76fe9d2033606a48d4816bd9c2d9d

    SHA1

    e46d8a9ed4d5da220c81baf5f1fdb94708e9aba2

    SHA256

    ee052fd5141bf769b841846170aabf0d7c2bb922c74c623c3f109344534f7a70

    SHA512

    62ef7095d1bf53354c20329c2ce8546c277aa0e791839c8a24108a01f9483a953979259e0ad04dbcab966444ee7cdd340f8c9557bc8f98e9400794f2751dc7e0