File name:

WOMicClientSetup5_2.exe

Full analysis: https://app.any.run/tasks/647a757f-6278-4b4c-b079-30ec9c103ea6
Verdict: Malicious activity
Analysis date: January 18, 2024, 11:21:34
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
MD5:

D8C68825B8A2CD1F00736B617240684C

SHA1:

7B68A0832785021E8883CEC41606E60FA4A887E6

SHA256:

C7C7227A636B4C612CDF3F3D803BE3EF1CF8F9AEDAD1C5D6620E0B9F6E0931A8

SSDEEP:

24576:Y12rpcEd5xQyaYXnCTZh5GYP7INP4w6ZtwZdsIAljoXHNAi7JYYDd+7PJms:QkzSy/nClDzBaZfuo3HYnPJd

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • WOMicClientSetup5_2.exe (PID: 2420)
      • devcon.exe (PID: 2480)
      • drvinst.exe (PID: 632)
      • drvinst.exe (PID: 1000)
    • Creates a writable file in the system directory

      • drvinst.exe (PID: 632)
      • drvinst.exe (PID: 1000)
  • SUSPICIOUS

    • Malware-specific behavior (creating "System.dll" in Temp)

      • WOMicClientSetup5_2.exe (PID: 2420)
    • The process creates files with name similar to system file names

      • WOMicClientSetup5_2.exe (PID: 2420)
    • Starts application with an unusual extension

      • WOMicClientSetup5_2.exe (PID: 2420)
    • Process drops legitimate windows executable

      • WOMicClientSetup5_2.exe (PID: 2420)
    • Uses NETSH.EXE to add a firewall rule or allowed programs

      • WOMicClientSetup5_2.exe (PID: 2420)
    • Executable content was dropped or overwritten

      • WOMicClientSetup5_2.exe (PID: 2420)
      • drvinst.exe (PID: 632)
      • devcon.exe (PID: 2480)
      • drvinst.exe (PID: 1000)
    • Drops a system driver (possible attempt to evade defenses)

      • WOMicClientSetup5_2.exe (PID: 2420)
      • devcon.exe (PID: 2480)
      • drvinst.exe (PID: 632)
      • drvinst.exe (PID: 1000)
    • Reads security settings of Internet Explorer

      • devcon.exe (PID: 2480)
    • Reads settings of System Certificates

      • devcon.exe (PID: 2480)
      • rundll32.exe (PID: 2328)
    • Checks Windows Trust Settings

      • devcon.exe (PID: 2480)
      • drvinst.exe (PID: 632)
      • drvinst.exe (PID: 1000)
    • Creates files in the driver directory

      • drvinst.exe (PID: 632)
      • drvinst.exe (PID: 1000)
    • Executes as Windows Service

      • VSSVC.exe (PID: 1924)
  • INFO

    • Reads the computer name

      • WOMicClientSetup5_2.exe (PID: 2420)
      • devcon.exe (PID: 2480)
      • drvinst.exe (PID: 632)
      • drvinst.exe (PID: 1000)
    • Checks supported languages

      • WOMicClientSetup5_2.exe (PID: 2420)
      • nsB48.tmp (PID: 1380)
      • devcon.exe (PID: 2480)
      • drvinst.exe (PID: 632)
      • WOMicClient.exe (PID: 2860)
      • drvinst.exe (PID: 1000)
    • Create files in a temporary directory

      • WOMicClientSetup5_2.exe (PID: 2420)
      • devcon.exe (PID: 2480)
    • Creates files or folders in the user directory

      • WOMicClientSetup5_2.exe (PID: 2420)
    • Creates files in the program directory

      • WOMicClientSetup5_2.exe (PID: 2420)
    • Reads the machine GUID from the registry

      • devcon.exe (PID: 2480)
      • drvinst.exe (PID: 632)
      • drvinst.exe (PID: 1000)
    • Reads security settings of Internet Explorer

      • rundll32.exe (PID: 2328)
    • Manual execution by a user

      • WOMicClient.exe (PID: 2860)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2016:04:03 22:19:02+02:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 25600
InitializedDataSize: 186368
UninitializedDataSize: 2048
EntryPoint: 0x32a0
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
56
Monitored processes
13
Malicious processes
5
Suspicious processes
0

Behavior graph

Click at the process to see the details
start womicclientsetup5_2.exe nsb48.tmp no specs netsh.exe no specs netsh.exe no specs netsh.exe no specs netsh.exe no specs devcon.exe drvinst.exe rundll32.exe no specs vssvc.exe no specs drvinst.exe womicclient.exe womicclientsetup5_2.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
632DrvInst.exe "4" "0" "C:\Users\admin\AppData\Local\Temp\{5cfc84ad-f2d9-7b3d-70ec-a455e5d01b34}\womic.inf" "0" "66d2d8b0f" "000003DC" "WinSta0\Default" "00000550" "208" "c:\program files\womic\driver"C:\Windows\System32\drvinst.exe
svchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Driver Installation Module
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\drvinst.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
764C:\Windows\system32\netsh.exe advfirewall firewall add rule name="WOMic" profile=any dir=in action=allow program="C:\Program Files\WOMic\womicclient.exe" enable=yes protocol=TCPC:\Windows\System32\netsh.exeWOMicClientSetup5_2.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Network Command Shell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\netsh.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\credui.dll
c:\windows\system32\user32.dll
1000DrvInst.exe "2" "211" "ROOT\MEDIA\0000" "C:\Windows\INF\oem2.inf" "womic.inf:StdMfg.ntx86:WOVAD_MicArray:1.5.0.0:*womic" "66d2d8b0f" "000003DC" "000005E0" "000005E8"C:\Windows\System32\drvinst.exe
svchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Driver Installation Module
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\drvinst.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1380"C:\Users\admin\AppData\Local\Temp\nsgFEA5.tmp\nsB48.tmp" devcon.exe hwids *WOMicC:\Users\admin\AppData\Local\Temp\nsgFEA5.tmp\nsB48.tmpWOMicClientSetup5_2.exe
User:
admin
Integrity Level:
HIGH
Exit code:
3221225501
Modules
Images
c:\users\admin\appdata\local\temp\nsgfea5.tmp\nsb48.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
1652C:\Windows\system32\netsh.exe advfirewall firewall add rule name="WOMic" profile=any dir=in action=allow program="C:\Program Files\WOMic\womicclient.exe" enable=yes protocol=UDPC:\Windows\System32\netsh.exeWOMicClientSetup5_2.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Network Command Shell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\netsh.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\credui.dll
c:\windows\system32\user32.dll
1924C:\Windows\system32\vssvc.exeC:\Windows\System32\VSSVC.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Volume Shadow Copy Service
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\vssvc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2036"C:\Users\admin\AppData\Local\Temp\WOMicClientSetup5_2.exe" C:\Users\admin\AppData\Local\Temp\WOMicClientSetup5_2.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\appdata\local\temp\womicclientsetup5_2.exe
c:\windows\system32\ntdll.dll
2128C:\Windows\system32\netsh.exe advfirewall firewall add rule name="WOMic" profile=any dir=out action=allow program="C:\Program Files\WOMic\womicclient.exe" enable=yes protocol=UDPC:\Windows\System32\netsh.exeWOMicClientSetup5_2.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Network Command Shell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\netsh.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\credui.dll
c:\windows\system32\user32.dll
2172C:\Windows\system32\netsh.exe advfirewall firewall add rule name="WOMic" profile=any dir=out action=allow program="C:\Program Files\WOMic\womicclient.exe" enable=yes protocol=TCPC:\Windows\System32\netsh.exeWOMicClientSetup5_2.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Network Command Shell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\netsh.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\credui.dll
c:\windows\system32\user32.dll
2328rundll32.exe C:\Windows\system32\pnpui.dll,InstallSecurityPromptRunDllW 20 Global\{6e096c00-ed77-7f01-e649-a36dc6ef8c11} Global\{277f914e-640b-48a5-c6ef-8c11c151084f} C:\Windows\System32\DriverStore\Temp\{50db485e-6bb2-31a0-4ccd-410942755312}\womic.inf C:\Windows\System32\DriverStore\Temp\{50db485e-6bb2-31a0-4ccd-410942755312}\womic.catC:\Windows\System32\rundll32.exedrvinst.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
Total events
19 470
Read events
18 919
Write events
551
Delete events
0

Modification events

(PID) Process:(2420) WOMicClientSetup5_2.exeKey:HKEY_CURRENT_USER\Software\Wolicheng\WOMic
Operation:writeName:language
Value:
1033
(PID) Process:(1652) netsh.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(764) netsh.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2128) netsh.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2172) netsh.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2480) devcon.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(632) drvinst.exeKey:HKEY_USERS\.DEFAULT\Software\Classes\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2328) rundll32.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(632) drvinst.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SystemRestore
Operation:writeName:SrCreateRp (Enter)
Value:
40000000000000009F5A7BD72FB0D90164030000840D0000D5070000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(632) drvinst.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SPP
Operation:writeName:SppCreate (Enter)
Value:
40000000000000009F5A7BD72FB0D90164030000840D0000D0070000000000000000000000000000000000000000000000000000000000000000000000000000
Executable files
28
Suspicious files
22
Text files
4
Unknown types
0

Dropped files

PID
Process
Filename
Type
2420WOMicClientSetup5_2.exeC:\Program Files\WOMic\WOMicClient.exeexecutable
MD5:26BA164873F020120E2267AC1CF16D43
SHA256:9E07DBCE584991A821EA7030BC8228271D1D2AA8CE3D4BF8F1D2309796D7EBCF
2420WOMicClientSetup5_2.exeC:\Program Files\WOMic\Resource_ru.dllexecutable
MD5:E26ED7B860D4D5FC63E822F82A25D4A0
SHA256:82099AA1A1334A60624B0EB59AF38BDE790142A23E8727634E10B46BD161CF1D
2420WOMicClientSetup5_2.exeC:\Program Files\WOMic\adb.exeexecutable
MD5:884242FB6CBBEC1F7711B946EF669E0E
SHA256:65210CB4139672B53ACAA2222B1005D036B0B02C437AA47E0E7B616FAB0E2F6F
2420WOMicClientSetup5_2.exeC:\Program Files\WOMic\Resource_cn.dllexecutable
MD5:A987FE5A3328DCBC41F243592AF05200
SHA256:96C06F8235314D08C76B5962F056663D13398E893E6B1D0C0B1221BE7DC3049B
2420WOMicClientSetup5_2.exeC:\Program Files\WOMic\AdbWinApi.dllexecutable
MD5:ED5A809DC0024D83CBAB4FB9933D598D
SHA256:D60103A5E99BC9888F786EE916F5D6E45493C3247972CB053833803DE7E95CF9
2420WOMicClientSetup5_2.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WO Mic Client\WO Mic Client.lnkbinary
MD5:55842BB659323D59AEEC670DBB783A94
SHA256:5C00BBB555582C992C1E7D44178FC6E509967668ECDE44F2840595299B76D27F
2420WOMicClientSetup5_2.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WO Mic Client\Uninstall.lnkbinary
MD5:D4A24A212784A185B802F5CA0FA56FE9
SHA256:EC69862DB42E831AA82339418895195B719B44AB8549CA2AB8F261B689014F2C
2420WOMicClientSetup5_2.exeC:\Program Files\WOMic\driver\womic.sysexecutable
MD5:509E86A92D2F96B950106B1FB6499599
SHA256:91A6E2993D08A720F9D1B83ECC253EAF75B44D8F7BD3C8273F10517D5EB18F14
2420WOMicClientSetup5_2.exeC:\Program Files\WOMic\AdbWinUsbApi.dllexecutable
MD5:0E24119DAF1909E398FA1850B6112077
SHA256:25207C506D29C4E8DCEB61B4BD50E8669BA26012988A43FBF26A890B1E60FC97
2420WOMicClientSetup5_2.exeC:\Program Files\WOMic\driver\womic.inftext
MD5:D0C5F56C7B3F63742F3455B43447547B
SHA256:4DB4066A459F73E58BB6F4E0859A256C58887997EF826225AE886EA32040ACAF
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
5
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown
4
System
192.168.100.255:137
whitelisted
192.168.100.74:49165
unknown

DNS requests

No data

Threats

No threats detected
No debug info