Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
07-10-2022 18:23
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20220901-en
General
-
Target
tmp.exe
-
Size
597KB
-
MD5
adf266d3870069d9c6ec30091d347f68
-
SHA1
dc27468702ccd3139f773c72ba64d38d8a50ff07
-
SHA256
dd44612801b32da18885221e9211c565eecceeef71217b5b9858b839d6f8dc0d
-
SHA512
cf57167932dde49b92cfcb72ee84dca1df51fe66d2ca2d832488bb4d410fd1f5ed9e0e8755a8fd5de41bb96f0e40fce35fa6c678ff4c794b7077026441ba26cd
-
SSDEEP
6144:xSyBmqk0G78MNNhrXN8d9sx40RZGI8i6e6jherVXLw1Ig:xSycICXhrMWx/4Iae6VkXUWg
Malware Config
Signatures
-
Detects Smokeloader packer 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3884-168-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral2/memory/3884-169-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader behavioral2/memory/3884-170-0x0000000000400000-0x0000000000409000-memory.dmp family_smokeloader -
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
tmp.exebmomsm.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Roaming\\ViperFolder\\FipersVWV.exe\"," tmp.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Roaming\\Colors\\Pink.exe\"," bmomsm.exe -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4856-138-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat -
Executes dropped EXE 1 IoCs
Processes:
bmomsm.exepid process 3888 bmomsm.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
RegAsm.exebmomsm.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation RegAsm.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation bmomsm.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
tmp.exebmomsm.exedescription pid process target process PID 3044 set thread context of 4856 3044 tmp.exe RegAsm.exe PID 3888 set thread context of 3884 3888 bmomsm.exe RegAsm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
RegAsm.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI RegAsm.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI RegAsm.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
tmp.exepowershell.exeRegAsm.exebmomsm.exepowershell.exeRegAsm.exepid process 3044 tmp.exe 3044 tmp.exe 1412 powershell.exe 4856 RegAsm.exe 1412 powershell.exe 3888 bmomsm.exe 3888 bmomsm.exe 3440 powershell.exe 3440 powershell.exe 3888 bmomsm.exe 3884 RegAsm.exe 3884 RegAsm.exe 3004 3004 3004 3004 3004 3004 3004 3004 3004 3004 3004 3004 3004 3004 3004 3004 3004 3004 3004 3004 3004 3004 3004 3004 3004 3004 3004 3004 3004 3004 3004 3004 3004 3004 3004 3004 3004 3004 3004 3004 3004 3004 3004 3004 3004 3004 3004 3004 3004 3004 3004 3004 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3004 -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
RegAsm.exepid process 3884 RegAsm.exe 3004 3004 3004 3004 -
Suspicious use of AdjustPrivilegeToken 21 IoCs
Processes:
tmp.exeRegAsm.exepowershell.exebmomsm.exepowershell.exedescription pid process Token: SeDebugPrivilege 3044 tmp.exe Token: SeDebugPrivilege 4856 RegAsm.exe Token: SeDebugPrivilege 1412 powershell.exe Token: SeDebugPrivilege 3888 bmomsm.exe Token: SeDebugPrivilege 3440 powershell.exe Token: SeShutdownPrivilege 3004 Token: SeCreatePagefilePrivilege 3004 Token: SeShutdownPrivilege 3004 Token: SeCreatePagefilePrivilege 3004 Token: SeShutdownPrivilege 3004 Token: SeCreatePagefilePrivilege 3004 Token: SeShutdownPrivilege 3004 Token: SeCreatePagefilePrivilege 3004 Token: SeShutdownPrivilege 3004 Token: SeCreatePagefilePrivilege 3004 Token: SeShutdownPrivilege 3004 Token: SeCreatePagefilePrivilege 3004 Token: SeShutdownPrivilege 3004 Token: SeCreatePagefilePrivilege 3004 Token: SeShutdownPrivilege 3004 Token: SeCreatePagefilePrivilege 3004 -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
tmp.exeRegAsm.execmd.exepowershell.exebmomsm.exedescription pid process target process PID 3044 wrote to memory of 4856 3044 tmp.exe RegAsm.exe PID 3044 wrote to memory of 4856 3044 tmp.exe RegAsm.exe PID 3044 wrote to memory of 4856 3044 tmp.exe RegAsm.exe PID 3044 wrote to memory of 4856 3044 tmp.exe RegAsm.exe PID 3044 wrote to memory of 4856 3044 tmp.exe RegAsm.exe PID 3044 wrote to memory of 4856 3044 tmp.exe RegAsm.exe PID 3044 wrote to memory of 4856 3044 tmp.exe RegAsm.exe PID 3044 wrote to memory of 4856 3044 tmp.exe RegAsm.exe PID 4856 wrote to memory of 4680 4856 RegAsm.exe cmd.exe PID 4856 wrote to memory of 4680 4856 RegAsm.exe cmd.exe PID 4856 wrote to memory of 4680 4856 RegAsm.exe cmd.exe PID 4680 wrote to memory of 1412 4680 cmd.exe powershell.exe PID 4680 wrote to memory of 1412 4680 cmd.exe powershell.exe PID 4680 wrote to memory of 1412 4680 cmd.exe powershell.exe PID 1412 wrote to memory of 3888 1412 powershell.exe bmomsm.exe PID 1412 wrote to memory of 3888 1412 powershell.exe bmomsm.exe PID 1412 wrote to memory of 3888 1412 powershell.exe bmomsm.exe PID 3888 wrote to memory of 3440 3888 bmomsm.exe powershell.exe PID 3888 wrote to memory of 3440 3888 bmomsm.exe powershell.exe PID 3888 wrote to memory of 3440 3888 bmomsm.exe powershell.exe PID 3888 wrote to memory of 3884 3888 bmomsm.exe RegAsm.exe PID 3888 wrote to memory of 3884 3888 bmomsm.exe RegAsm.exe PID 3888 wrote to memory of 3884 3888 bmomsm.exe RegAsm.exe PID 3888 wrote to memory of 3884 3888 bmomsm.exe RegAsm.exe PID 3888 wrote to memory of 3884 3888 bmomsm.exe RegAsm.exe PID 3888 wrote to memory of 3884 3888 bmomsm.exe RegAsm.exe PID 3004 wrote to memory of 4924 3004 explorer.exe PID 3004 wrote to memory of 4924 3004 explorer.exe PID 3004 wrote to memory of 4924 3004 explorer.exe PID 3004 wrote to memory of 4924 3004 explorer.exe PID 3004 wrote to memory of 4028 3004 explorer.exe PID 3004 wrote to memory of 4028 3004 explorer.exe PID 3004 wrote to memory of 4028 3004 explorer.exe -
outlook_office_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
outlook_win_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\bmomsm.exe"' & exit3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\bmomsm.exe"'4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\bmomsm.exe"C:\Users\Admin\AppData\Local\Temp\bmomsm.exe"5⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQAwADsAIABTAGUAdAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAJwBDADoAXAAnAA==6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe6⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
1KB
MD5def65711d78669d7f8e69313be4acf2e
SHA16522ebf1de09eeb981e270bd95114bc69a49cda6
SHA256aa1c97cdbce9a848f1db2ad483f19caa535b55a3a1ef2ad1260e0437002bc82c
SHA51205b2f9cd9bc3b46f52fded320b68e05f79b2b3ceaeb13e5d87ae9f8cd8e6c90bbb4ffa4da8192c2bfe0f58826cabff2e99e7c5cc8dd47037d4eb7bfc6f2710a7
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
15KB
MD5119f870c8094dd187c3eaaecc44b1d74
SHA155a09a38679f12ddd4b46964cbfd7ef88eee3a7e
SHA256cfb257a829fad79a59c4149ec11b41c73c93da409f89f60d19a031f14fe926c7
SHA5124a2a6e57b5b674783207a47a3935c6bbdfac19338b18a1f9031e2f577243bbfc3c840f3c221ebdf9a4f170888df2fe90e17d4cfdfea61232f2b0e4fa4e156fdc
-
C:\Users\Admin\AppData\Local\Temp\bmomsm.exeFilesize
2.3MB
MD5a08e5952ddaaabe4b7deaf30e3e522d3
SHA1d111978b9e2ea04f53ce48a36a4fde0e0e900ba3
SHA25652e3418b1b6e40efcfe1f6509e91da1f2f87bcd4f815cae8d1e89a0ebd6be58f
SHA5122f4433af151bf7cbf62087206a6bbc4a77dfbf4c5a873edf7828bd54997105f0f413afc21255ea628e648b75c4b82f6a1d402d00fa9f21d01a4013e504195cea
-
C:\Users\Admin\AppData\Local\Temp\bmomsm.exeFilesize
2.3MB
MD5a08e5952ddaaabe4b7deaf30e3e522d3
SHA1d111978b9e2ea04f53ce48a36a4fde0e0e900ba3
SHA25652e3418b1b6e40efcfe1f6509e91da1f2f87bcd4f815cae8d1e89a0ebd6be58f
SHA5122f4433af151bf7cbf62087206a6bbc4a77dfbf4c5a873edf7828bd54997105f0f413afc21255ea628e648b75c4b82f6a1d402d00fa9f21d01a4013e504195cea
-
memory/1412-150-0x0000000006D40000-0x0000000006D5A000-memory.dmpFilesize
104KB
-
memory/1412-151-0x0000000006D90000-0x0000000006DB2000-memory.dmpFilesize
136KB
-
memory/1412-145-0x0000000005D80000-0x00000000063A8000-memory.dmpFilesize
6.2MB
-
memory/1412-149-0x0000000006DC0000-0x0000000006E56000-memory.dmpFilesize
600KB
-
memory/1412-148-0x0000000006770000-0x000000000678E000-memory.dmpFilesize
120KB
-
memory/1412-147-0x0000000005B40000-0x0000000005BA6000-memory.dmpFilesize
408KB
-
memory/1412-146-0x00000000059A0000-0x00000000059C2000-memory.dmpFilesize
136KB
-
memory/1412-143-0x0000000000000000-mapping.dmp
-
memory/1412-144-0x0000000002F30000-0x0000000002F66000-memory.dmpFilesize
216KB
-
memory/3004-183-0x00000000027F0000-0x0000000002800000-memory.dmpFilesize
64KB
-
memory/3004-192-0x0000000002720000-0x0000000002730000-memory.dmpFilesize
64KB
-
memory/3004-201-0x00000000026D0000-0x00000000026E0000-memory.dmpFilesize
64KB
-
memory/3004-200-0x0000000002970000-0x0000000002980000-memory.dmpFilesize
64KB
-
memory/3004-199-0x00000000026D0000-0x00000000026E0000-memory.dmpFilesize
64KB
-
memory/3004-198-0x00000000026E0000-0x00000000026F0000-memory.dmpFilesize
64KB
-
memory/3004-197-0x0000000002970000-0x0000000002980000-memory.dmpFilesize
64KB
-
memory/3004-177-0x00000000027F0000-0x0000000002800000-memory.dmpFilesize
64KB
-
memory/3004-196-0x00000000026C0000-0x00000000026D0000-memory.dmpFilesize
64KB
-
memory/3004-173-0x00000000027F0000-0x0000000002800000-memory.dmpFilesize
64KB
-
memory/3004-195-0x0000000002970000-0x0000000002980000-memory.dmpFilesize
64KB
-
memory/3004-194-0x0000000002720000-0x0000000002730000-memory.dmpFilesize
64KB
-
memory/3004-172-0x0000000002970000-0x0000000002980000-memory.dmpFilesize
64KB
-
memory/3004-181-0x00000000027F0000-0x0000000002800000-memory.dmpFilesize
64KB
-
memory/3004-193-0x0000000002720000-0x0000000002730000-memory.dmpFilesize
64KB
-
memory/3004-175-0x00000000027F0000-0x0000000002800000-memory.dmpFilesize
64KB
-
memory/3004-191-0x0000000002720000-0x0000000002730000-memory.dmpFilesize
64KB
-
memory/3004-190-0x0000000002720000-0x0000000002730000-memory.dmpFilesize
64KB
-
memory/3004-189-0x0000000002970000-0x0000000002980000-memory.dmpFilesize
64KB
-
memory/3004-188-0x0000000002970000-0x0000000002980000-memory.dmpFilesize
64KB
-
memory/3004-187-0x0000000002970000-0x0000000002980000-memory.dmpFilesize
64KB
-
memory/3004-185-0x0000000002720000-0x0000000002730000-memory.dmpFilesize
64KB
-
memory/3004-186-0x0000000002970000-0x0000000002980000-memory.dmpFilesize
64KB
-
memory/3004-184-0x0000000002970000-0x0000000002980000-memory.dmpFilesize
64KB
-
memory/3004-182-0x00000000027F0000-0x0000000002800000-memory.dmpFilesize
64KB
-
memory/3044-132-0x0000000000040000-0x00000000000DC000-memory.dmpFilesize
624KB
-
memory/3044-133-0x0000000005070000-0x0000000005614000-memory.dmpFilesize
5.6MB
-
memory/3044-134-0x0000000004AC0000-0x0000000004B52000-memory.dmpFilesize
584KB
-
memory/3044-135-0x0000000004A70000-0x0000000004A7A000-memory.dmpFilesize
40KB
-
memory/3044-136-0x00000000373E0000-0x0000000037446000-memory.dmpFilesize
408KB
-
memory/3440-160-0x00000000070D0000-0x0000000007102000-memory.dmpFilesize
200KB
-
memory/3440-156-0x0000000000000000-mapping.dmp
-
memory/3440-159-0x0000000007820000-0x0000000007E9A000-memory.dmpFilesize
6.5MB
-
memory/3440-161-0x000000006F400000-0x000000006F44C000-memory.dmpFilesize
304KB
-
memory/3440-162-0x00000000064C0000-0x00000000064DE000-memory.dmpFilesize
120KB
-
memory/3440-163-0x0000000007280000-0x000000000728A000-memory.dmpFilesize
40KB
-
memory/3440-164-0x0000000007430000-0x000000000743E000-memory.dmpFilesize
56KB
-
memory/3440-165-0x00000000074A0000-0x00000000074BA000-memory.dmpFilesize
104KB
-
memory/3440-166-0x0000000007480000-0x0000000007488000-memory.dmpFilesize
32KB
-
memory/3884-168-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/3884-167-0x0000000000000000-mapping.dmp
-
memory/3884-169-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/3884-170-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/3888-153-0x0000000000000000-mapping.dmp
-
memory/3888-155-0x0000000000AE0000-0x0000000000D36000-memory.dmpFilesize
2.3MB
-
memory/4028-180-0x00000000003F0000-0x00000000003FC000-memory.dmpFilesize
48KB
-
memory/4028-178-0x0000000000000000-mapping.dmp
-
memory/4680-142-0x0000000000000000-mapping.dmp
-
memory/4856-137-0x0000000000000000-mapping.dmp
-
memory/4856-138-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4856-139-0x00000000052D0000-0x000000000536C000-memory.dmpFilesize
624KB
-
memory/4856-140-0x00000000064D0000-0x0000000006546000-memory.dmpFilesize
472KB
-
memory/4856-141-0x0000000006490000-0x00000000064AE000-memory.dmpFilesize
120KB
-
memory/4924-174-0x0000000001150000-0x00000000011C5000-memory.dmpFilesize
468KB
-
memory/4924-176-0x00000000010E0000-0x000000000114B000-memory.dmpFilesize
428KB
-
memory/4924-179-0x00000000010E0000-0x000000000114B000-memory.dmpFilesize
428KB
-
memory/4924-171-0x0000000000000000-mapping.dmp