Analysis

  • max time kernel
    206s
  • max time network
    211s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    29-11-2022 17:46

General

  • Target

    tmp.exe

  • Size

    710KB

  • MD5

    e403c2bbdd544797a9d702de09165779

  • SHA1

    f47a7dd5095cca86ec026990a6ca66465139c1b1

  • SHA256

    3873c3bbf02f10de5e67b0da4c9002d4f936bae5aa287a83b078ae208e94f381

  • SHA512

    4a0a65ddaa920fb8e1cfc525cf9efc905d98376ee46f7d0b22ca1e477c20f1b33ed426b5ce225ad05839f90a8816bb7cc58ab0ed2a1effafb92e3c4354fee5b5

  • SSDEEP

    6144:tbFfUhXQel80lOImzwFO/ChdqoQ+S8BZu+2MLjb2KPhZ8NjEmfQGX3bzhj9rUrmi:tFfSQel80MUFO/Chd1q8kehZOYmDb

Malware Config

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • Detects Smokeloader packer 4 IoCs
  • Modifies WinLogon for persistence 2 TTPs 3 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Async RAT payload 7 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 32 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1128
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1804
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\udwebn.exe"' & exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1424
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\udwebn.exe"'
          4⤵
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1364
          • C:\Users\Admin\AppData\Local\Temp\udwebn.exe
            "C:\Users\Admin\AppData\Local\Temp\udwebn.exe"
            5⤵
            • Modifies WinLogon for persistence
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1756
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
              6⤵
                PID:1868
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\geomnv.exe"' & exit
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1588
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\geomnv.exe"'
            4⤵
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1564
            • C:\Users\Admin\AppData\Local\Temp\geomnv.exe
              "C:\Users\Admin\AppData\Local\Temp\geomnv.exe"
              5⤵
              • Modifies WinLogon for persistence
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1996
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQAwADsAIABTAGUAdAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAJwBDADoAXAAnAA==
                6⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:268
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                6⤵
                • Checks SCSI registry key(s)
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious behavior: MapViewOfSection
                PID:832
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\bajkpe.exe"' & exit
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:524
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\bajkpe.exe"'
            4⤵
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1468
            • C:\Users\Admin\AppData\Local\Temp\bajkpe.exe
              "C:\Users\Admin\AppData\Local\Temp\bajkpe.exe"
              5⤵
              • Executes dropped EXE
              PID:976
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\lexnye.exe"' & exit
          3⤵
            PID:1460
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\lexnye.exe"'
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:692

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Winlogon Helper DLL

      1
      T1004

      Defense Evasion

      Modify Registry

      1
      T1112

      Discovery

      System Information Discovery

      2
      T1082

      Query Registry

      1
      T1012

      Peripheral Device Discovery

      1
      T1120

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\bajkpe.exe
        Filesize

        1.0MB

        MD5

        7217f672995942607eba0cd4fb1bb117

        SHA1

        c0079cdb09360d3e2e9f449035f38c9dad5cad1d

        SHA256

        ed18053ff11ef58b9ec9c8cf2d7e999dd72effba8c4558b0c7e50b081caae4e1

        SHA512

        d642540a341d8d982bb808b576f4153922c5d0118fa8d314d81b9bc362035773bc26fff2cd5f6204d3ed3f58312f365f3b81f918cb03094534b7b0b16eb503c2

      • C:\Users\Admin\AppData\Local\Temp\bajkpe.exe
        Filesize

        1.0MB

        MD5

        7217f672995942607eba0cd4fb1bb117

        SHA1

        c0079cdb09360d3e2e9f449035f38c9dad5cad1d

        SHA256

        ed18053ff11ef58b9ec9c8cf2d7e999dd72effba8c4558b0c7e50b081caae4e1

        SHA512

        d642540a341d8d982bb808b576f4153922c5d0118fa8d314d81b9bc362035773bc26fff2cd5f6204d3ed3f58312f365f3b81f918cb03094534b7b0b16eb503c2

      • C:\Users\Admin\AppData\Local\Temp\geomnv.exe
        Filesize

        2.3MB

        MD5

        a08e5952ddaaabe4b7deaf30e3e522d3

        SHA1

        d111978b9e2ea04f53ce48a36a4fde0e0e900ba3

        SHA256

        52e3418b1b6e40efcfe1f6509e91da1f2f87bcd4f815cae8d1e89a0ebd6be58f

        SHA512

        2f4433af151bf7cbf62087206a6bbc4a77dfbf4c5a873edf7828bd54997105f0f413afc21255ea628e648b75c4b82f6a1d402d00fa9f21d01a4013e504195cea

      • C:\Users\Admin\AppData\Local\Temp\geomnv.exe
        Filesize

        2.3MB

        MD5

        a08e5952ddaaabe4b7deaf30e3e522d3

        SHA1

        d111978b9e2ea04f53ce48a36a4fde0e0e900ba3

        SHA256

        52e3418b1b6e40efcfe1f6509e91da1f2f87bcd4f815cae8d1e89a0ebd6be58f

        SHA512

        2f4433af151bf7cbf62087206a6bbc4a77dfbf4c5a873edf7828bd54997105f0f413afc21255ea628e648b75c4b82f6a1d402d00fa9f21d01a4013e504195cea

      • C:\Users\Admin\AppData\Local\Temp\udwebn.exe
        Filesize

        828KB

        MD5

        494969d84ee004227da4051403cbc098

        SHA1

        befd216439b68c83899476ea7bf5c7eff025bdc6

        SHA256

        c92db9ae788154a5b6f08a648e663000803dfba5aa893cfaef69b18c06d7fc48

        SHA512

        ddc6d8745fb4b5c89990da7e85c5475a1fe91ece05b127258c85ad78d63a137a383bbf5a798c1b54d49d7506b53c03677bafa17ef7c8080f8f5bde1ebf552676

      • C:\Users\Admin\AppData\Local\Temp\udwebn.exe
        Filesize

        828KB

        MD5

        494969d84ee004227da4051403cbc098

        SHA1

        befd216439b68c83899476ea7bf5c7eff025bdc6

        SHA256

        c92db9ae788154a5b6f08a648e663000803dfba5aa893cfaef69b18c06d7fc48

        SHA512

        ddc6d8745fb4b5c89990da7e85c5475a1fe91ece05b127258c85ad78d63a137a383bbf5a798c1b54d49d7506b53c03677bafa17ef7c8080f8f5bde1ebf552676

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
        Filesize

        7KB

        MD5

        7f82892467ea7d8e4f069642e2cd7bc3

        SHA1

        d8d49ddbf77270e179a531f54facbc7ee09a51a5

        SHA256

        8cf23932ce87411e128ca83eed727d5e9f4c09cc62f37a3b0514f682e7c90282

        SHA512

        a869fcf3d7313faf0bb5508dd7343f2a55e992b3bbfca26f155f56428dcb9a2b9d5233c7530b41fb7bb0d5f6dbecd3a83374e617648666341d981d56a40393b2

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
        Filesize

        7KB

        MD5

        7f82892467ea7d8e4f069642e2cd7bc3

        SHA1

        d8d49ddbf77270e179a531f54facbc7ee09a51a5

        SHA256

        8cf23932ce87411e128ca83eed727d5e9f4c09cc62f37a3b0514f682e7c90282

        SHA512

        a869fcf3d7313faf0bb5508dd7343f2a55e992b3bbfca26f155f56428dcb9a2b9d5233c7530b41fb7bb0d5f6dbecd3a83374e617648666341d981d56a40393b2

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
        Filesize

        7KB

        MD5

        7f82892467ea7d8e4f069642e2cd7bc3

        SHA1

        d8d49ddbf77270e179a531f54facbc7ee09a51a5

        SHA256

        8cf23932ce87411e128ca83eed727d5e9f4c09cc62f37a3b0514f682e7c90282

        SHA512

        a869fcf3d7313faf0bb5508dd7343f2a55e992b3bbfca26f155f56428dcb9a2b9d5233c7530b41fb7bb0d5f6dbecd3a83374e617648666341d981d56a40393b2

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
        Filesize

        7KB

        MD5

        7f82892467ea7d8e4f069642e2cd7bc3

        SHA1

        d8d49ddbf77270e179a531f54facbc7ee09a51a5

        SHA256

        8cf23932ce87411e128ca83eed727d5e9f4c09cc62f37a3b0514f682e7c90282

        SHA512

        a869fcf3d7313faf0bb5508dd7343f2a55e992b3bbfca26f155f56428dcb9a2b9d5233c7530b41fb7bb0d5f6dbecd3a83374e617648666341d981d56a40393b2

      • \??\PIPE\srvsvc
        MD5

        d41d8cd98f00b204e9800998ecf8427e

        SHA1

        da39a3ee5e6b4b0d3255bfef95601890afd80709

        SHA256

        e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

        SHA512

        cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

      • \Users\Admin\AppData\Local\Temp\bajkpe.exe
        Filesize

        1.0MB

        MD5

        7217f672995942607eba0cd4fb1bb117

        SHA1

        c0079cdb09360d3e2e9f449035f38c9dad5cad1d

        SHA256

        ed18053ff11ef58b9ec9c8cf2d7e999dd72effba8c4558b0c7e50b081caae4e1

        SHA512

        d642540a341d8d982bb808b576f4153922c5d0118fa8d314d81b9bc362035773bc26fff2cd5f6204d3ed3f58312f365f3b81f918cb03094534b7b0b16eb503c2

      • \Users\Admin\AppData\Local\Temp\geomnv.exe
        Filesize

        2.3MB

        MD5

        a08e5952ddaaabe4b7deaf30e3e522d3

        SHA1

        d111978b9e2ea04f53ce48a36a4fde0e0e900ba3

        SHA256

        52e3418b1b6e40efcfe1f6509e91da1f2f87bcd4f815cae8d1e89a0ebd6be58f

        SHA512

        2f4433af151bf7cbf62087206a6bbc4a77dfbf4c5a873edf7828bd54997105f0f413afc21255ea628e648b75c4b82f6a1d402d00fa9f21d01a4013e504195cea

      • \Users\Admin\AppData\Local\Temp\udwebn.exe
        Filesize

        828KB

        MD5

        494969d84ee004227da4051403cbc098

        SHA1

        befd216439b68c83899476ea7bf5c7eff025bdc6

        SHA256

        c92db9ae788154a5b6f08a648e663000803dfba5aa893cfaef69b18c06d7fc48

        SHA512

        ddc6d8745fb4b5c89990da7e85c5475a1fe91ece05b127258c85ad78d63a137a383bbf5a798c1b54d49d7506b53c03677bafa17ef7c8080f8f5bde1ebf552676

      • memory/268-94-0x0000000000000000-mapping.dmp
      • memory/268-114-0x000000006D550000-0x000000006DAFB000-memory.dmp
        Filesize

        5.7MB

      • memory/268-119-0x000000006D550000-0x000000006DAFB000-memory.dmp
        Filesize

        5.7MB

      • memory/268-97-0x000000006D550000-0x000000006DAFB000-memory.dmp
        Filesize

        5.7MB

      • memory/524-115-0x0000000000000000-mapping.dmp
      • memory/692-126-0x0000000000000000-mapping.dmp
      • memory/692-140-0x000000006E8E0000-0x000000006EE8B000-memory.dmp
        Filesize

        5.7MB

      • memory/832-131-0x0000000000400000-0x0000000000409000-memory.dmp
        Filesize

        36KB

      • memory/832-132-0x0000000000400000-0x0000000000409000-memory.dmp
        Filesize

        36KB

      • memory/832-134-0x0000000000400000-0x0000000000409000-memory.dmp
        Filesize

        36KB

      • memory/832-135-0x0000000000402EBC-mapping.dmp
      • memory/832-141-0x0000000000400000-0x0000000000409000-memory.dmp
        Filesize

        36KB

      • memory/832-139-0x0000000000400000-0x0000000000409000-memory.dmp
        Filesize

        36KB

      • memory/976-137-0x0000000000AB0000-0x0000000000BC2000-memory.dmp
        Filesize

        1.1MB

      • memory/976-142-0x00000000020E0000-0x0000000002128000-memory.dmp
        Filesize

        288KB

      • memory/976-123-0x0000000000000000-mapping.dmp
      • memory/976-138-0x0000000002030000-0x00000000020E6000-memory.dmp
        Filesize

        728KB

      • memory/1128-56-0x0000000004870000-0x0000000004902000-memory.dmp
        Filesize

        584KB

      • memory/1128-55-0x00000000004B0000-0x000000000050C000-memory.dmp
        Filesize

        368KB

      • memory/1128-57-0x0000000075C81000-0x0000000075C83000-memory.dmp
        Filesize

        8KB

      • memory/1128-54-0x00000000000C0000-0x0000000000178000-memory.dmp
        Filesize

        736KB

      • memory/1364-74-0x000000006E3D0000-0x000000006E97B000-memory.dmp
        Filesize

        5.7MB

      • memory/1364-72-0x0000000000000000-mapping.dmp
      • memory/1364-79-0x000000006E3D0000-0x000000006E97B000-memory.dmp
        Filesize

        5.7MB

      • memory/1424-71-0x0000000000000000-mapping.dmp
      • memory/1460-125-0x0000000000000000-mapping.dmp
      • memory/1468-130-0x000000006CFA0000-0x000000006D54B000-memory.dmp
        Filesize

        5.7MB

      • memory/1468-121-0x000000006CFA0000-0x000000006D54B000-memory.dmp
        Filesize

        5.7MB

      • memory/1468-116-0x0000000000000000-mapping.dmp
      • memory/1564-81-0x0000000000000000-mapping.dmp
      • memory/1564-89-0x000000006E390000-0x000000006E93B000-memory.dmp
        Filesize

        5.7MB

      • memory/1588-80-0x0000000000000000-mapping.dmp
      • memory/1756-98-0x000000001B070000-0x000000001B134000-memory.dmp
        Filesize

        784KB

      • memory/1756-77-0x0000000000000000-mapping.dmp
      • memory/1756-83-0x000000013FDA0000-0x000000013FE72000-memory.dmp
        Filesize

        840KB

      • memory/1804-63-0x0000000000400000-0x0000000000412000-memory.dmp
        Filesize

        72KB

      • memory/1804-61-0x0000000000400000-0x0000000000412000-memory.dmp
        Filesize

        72KB

      • memory/1804-70-0x0000000000450000-0x000000000045C000-memory.dmp
        Filesize

        48KB

      • memory/1804-66-0x0000000000400000-0x0000000000412000-memory.dmp
        Filesize

        72KB

      • memory/1804-59-0x0000000000400000-0x0000000000412000-memory.dmp
        Filesize

        72KB

      • memory/1804-68-0x0000000000400000-0x0000000000412000-memory.dmp
        Filesize

        72KB

      • memory/1804-58-0x0000000000400000-0x0000000000412000-memory.dmp
        Filesize

        72KB

      • memory/1804-64-0x000000000040C79E-mapping.dmp
      • memory/1804-62-0x0000000000400000-0x0000000000412000-memory.dmp
        Filesize

        72KB

      • memory/1868-102-0x0000000140000000-0x00000001400D9000-memory.dmp
        Filesize

        868KB

      • memory/1868-109-0x0000000140000000-0x00000001400D9000-memory.dmp
        Filesize

        868KB

      • memory/1868-104-0x0000000140000000-0x00000001400D9000-memory.dmp
        Filesize

        868KB

      • memory/1868-100-0x0000000140000000-0x00000001400D9000-memory.dmp
        Filesize

        868KB

      • memory/1868-99-0x0000000140000000-0x00000001400D9000-memory.dmp
        Filesize

        868KB

      • memory/1868-107-0x0000000140000000-0x00000001400D9000-memory.dmp
        Filesize

        868KB

      • memory/1868-113-0x0000000140000000-0x00000001400D9000-memory.dmp
        Filesize

        868KB

      • memory/1868-112-0x0000000140000000-0x00000001400D9000-memory.dmp
        Filesize

        868KB

      • memory/1868-110-0x0000000140095CF4-mapping.dmp
      • memory/1868-106-0x0000000140000000-0x00000001400D9000-memory.dmp
        Filesize

        868KB

      • memory/1996-87-0x0000000000000000-mapping.dmp
      • memory/1996-90-0x0000000000840000-0x0000000000A96000-memory.dmp
        Filesize

        2.3MB

      • memory/1996-91-0x0000000004490000-0x0000000004538000-memory.dmp
        Filesize

        672KB

      • memory/1996-92-0x0000000002250000-0x00000000022E2000-memory.dmp
        Filesize

        584KB