Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/02/2025, 02:43
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-27_f7ecddf6c68fa682bec8a847421c519b_smoke-loader_wapomi.exe
Resource
win7-20240903-en
General
-
Target
2025-02-27_f7ecddf6c68fa682bec8a847421c519b_smoke-loader_wapomi.exe
-
Size
94KB
-
MD5
f7ecddf6c68fa682bec8a847421c519b
-
SHA1
0f5bd33ae134db2ac9efb4b36ff84850cb22d013
-
SHA256
caefd53d1368a9e80e4cb0b15b4f803b8bea5a722c3001bf3778cc9dff7906b8
-
SHA512
a34323ede0d921314c5c8699f95d2b1212d6d94215ec141a4ae7e1a39d0fe430b9323f79682c5d4bc5d66097e8b43aa9ba8d3459c9a3fab8c88c52ac8b5e0eac
-
SSDEEP
1536:3HSpeffJzpa4PKvvMupbRzh7mI565HrVTblQfqAYUGCq2iW7z:3HSpefhpa4PKHffw9hTSf1GCH
Malware Config
Extracted
bdaejec
ddos.dnsnb8.net
Signatures
-
Bdaejec family
-
Detects Bdaejec Backdoor. 2 IoCs
Bdaejec is backdoor written in C++.
resource yara_rule behavioral1/memory/2212-40-0x0000000000870000-0x0000000000879000-memory.dmp family_bdaejec_backdoor behavioral1/memory/2820-41-0x0000000000BE0000-0x0000000000BE9000-memory.dmp family_bdaejec_backdoor -
Emotet family
-
resource yara_rule behavioral1/files/0x0008000000012102-7.dat aspack_v212_v242 -
Executes dropped EXE 2 IoCs
pid Process 2212 LwGHftN.exe 2820 LwGHftN.exe -
Loads dropped DLL 4 IoCs
pid Process 1856 2025-02-27_f7ecddf6c68fa682bec8a847421c519b_smoke-loader_wapomi.exe 1856 2025-02-27_f7ecddf6c68fa682bec8a847421c519b_smoke-loader_wapomi.exe 2852 wrapprompt.exe 2852 wrapprompt.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat wrapprompt.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat LwGHftN.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Games\Chess\Chess.exe LwGHftN.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\reader_sl.exe LwGHftN.exe File opened for modification C:\Program Files\Java\jre7\bin\rmiregistry.exe LwGHftN.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSPUB.EXE LwGHftN.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSTORE.EXE LwGHftN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java.exe LwGHftN.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\Mahjong.exe LwGHftN.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE LwGHftN.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\A3DUtility.exe LwGHftN.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AdobeCollabSync.exe LwGHftN.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\sidebar.exe LwGHftN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\appletviewer.exe LwGHftN.exe File opened for modification C:\Program Files\Windows Defender\MSASCui.exe LwGHftN.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOUC.EXE LwGHftN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jp2launcher.exe LwGHftN.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice.exe LwGHftN.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe LwGHftN.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CNFNOT32.EXE LwGHftN.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE LwGHftN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jarsigner.exe LwGHftN.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateComRegisterShell64.exe LwGHftN.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.exe LwGHftN.exe File opened for modification C:\Program Files\7-Zip\7zG.exe LwGHftN.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe LwGHftN.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe LwGHftN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javah.exe LwGHftN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jabswitch.exe LwGHftN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\pack200.exe LwGHftN.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONENOTE.EXE LwGHftN.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PPTICO.EXE LwGHftN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jdb.exe LwGHftN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jsadebugd.exe LwGHftN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\tnameserv.exe LwGHftN.exe File opened for modification C:\Program Files\Java\jre7\bin\jabswitch.exe LwGHftN.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\106.0.5249.119\chrome_installer.exe LwGHftN.exe File opened for modification C:\Program Files\Java\jre7\bin\javacpl.exe LwGHftN.exe File opened for modification C:\Program Files\Java\jre7\bin\jp2launcher.exe LwGHftN.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SETLANG.EXE LwGHftN.exe File opened for modification C:\Program Files (x86)\Windows Mail\wab.exe LwGHftN.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe LwGHftN.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\shvlzm.exe LwGHftN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\xjc.exe LwGHftN.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CLVIEW.EXE LwGHftN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmic.exe LwGHftN.exe File opened for modification C:\Program Files\Windows Defender\MSASCui.exe LwGHftN.exe File opened for modification C:\Program Files\7-Zip\7zG.exe LwGHftN.exe File opened for modification C:\Program Files\DVD Maker\DVDMaker.exe LwGHftN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\native2ascii.exe LwGHftN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\unpack200.exe LwGHftN.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\XLICONS.EXE LwGHftN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmc.exe LwGHftN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmid.exe LwGHftN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ssvagent.exe LwGHftN.exe File opened for modification C:\Program Files\Java\jre7\bin\keytool.exe LwGHftN.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\FreeCell.exe LwGHftN.exe File opened for modification C:\Program Files\Mozilla Firefox\private_browsing.exe LwGHftN.exe File opened for modification C:\Program Files\Windows Photo Viewer\ImagingDevices.exe LwGHftN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jvisualvm.exe LwGHftN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\xjc.exe LwGHftN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\unpack200.exe LwGHftN.exe File opened for modification C:\Program Files\Java\jre7\bin\tnameserv.exe LwGHftN.exe File opened for modification C:\Program Files\Java\jre7\bin\javaw.exe LwGHftN.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jar.exe LwGHftN.exe File opened for modification C:\Program Files\Java\jre7\bin\rmid.exe LwGHftN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-02-27_f7ecddf6c68fa682bec8a847421c519b_smoke-loader_wapomi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LwGHftN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wrapprompt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LwGHftN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wrapprompt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-02-27_f7ecddf6c68fa682bec8a847421c519b_smoke-loader_wapomi.exe -
Modifies data under HKEY_USERS 52 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-df-b0-ec-81-1d\WpadDecisionTime = 20233d99c188db01 LwGHftN.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix LwGHftN.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00e2000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 LwGHftN.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{963AACC6-416A-4C4D-BAE3-65DCAA05AF64}\WpadDecisionTime = 80916665c188db01 LwGHftN.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00e2000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 wrapprompt.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-df-b0-ec-81-1d wrapprompt.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00e2000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 wrapprompt.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{963AACC6-416A-4C4D-BAE3-65DCAA05AF64}\WpadDecisionReason = "1" wrapprompt.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings LwGHftN.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{963AACC6-416A-4C4D-BAE3-65DCAA05AF64}\WpadNetworkName = "Network 3" LwGHftN.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{963AACC6-416A-4C4D-BAE3-65DCAA05AF64}\76-df-b0-ec-81-1d LwGHftN.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-df-b0-ec-81-1d\WpadDecisionReason = "1" LwGHftN.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-df-b0-ec-81-1d\WpadDecisionReason = "1" wrapprompt.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{963AACC6-416A-4C4D-BAE3-65DCAA05AF64}\WpadDecisionTime = 609acb71c188db01 wrapprompt.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{963AACC6-416A-4C4D-BAE3-65DCAA05AF64}\WpadDecision = "0" wrapprompt.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-df-b0-ec-81-1d\WpadDecisionTime = 609acb71c188db01 LwGHftN.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ LwGHftN.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings LwGHftN.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 LwGHftN.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{963AACC6-416A-4C4D-BAE3-65DCAA05AF64} LwGHftN.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-df-b0-ec-81-1d\WpadDecisionTime = 80916665c188db01 LwGHftN.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" wrapprompt.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{963AACC6-416A-4C4D-BAE3-65DCAA05AF64}\WpadDecisionTime = 00b1908cc188db01 LwGHftN.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" LwGHftN.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad LwGHftN.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" wrapprompt.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" wrapprompt.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-df-b0-ec-81-1d\WpadDecision = "0" wrapprompt.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-df-b0-ec-81-1d\WpadDecisionTime = 609acb71c188db01 wrapprompt.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" LwGHftN.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-df-b0-ec-81-1d LwGHftN.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections wrapprompt.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix wrapprompt.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-df-b0-ec-81-1d\WpadDecisionTime = 80916665c188db01 wrapprompt.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{963AACC6-416A-4C4D-BAE3-65DCAA05AF64}\WpadDecisionTime = 20233d99c188db01 LwGHftN.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" LwGHftN.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" LwGHftN.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad wrapprompt.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{963AACC6-416A-4C4D-BAE3-65DCAA05AF64}\76-df-b0-ec-81-1d wrapprompt.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{963AACC6-416A-4C4D-BAE3-65DCAA05AF64} wrapprompt.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-df-b0-ec-81-1d\WpadDetectedUrl LwGHftN.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections LwGHftN.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{963AACC6-416A-4C4D-BAE3-65DCAA05AF64}\WpadDecisionReason = "1" LwGHftN.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings wrapprompt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings wrapprompt.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-df-b0-ec-81-1d\WpadDetectedUrl wrapprompt.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 LwGHftN.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" LwGHftN.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{963AACC6-416A-4C4D-BAE3-65DCAA05AF64}\WpadDecision = "0" LwGHftN.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-df-b0-ec-81-1d\WpadDecision = "0" LwGHftN.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{963AACC6-416A-4C4D-BAE3-65DCAA05AF64}\WpadNetworkName = "Network 3" wrapprompt.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\76-df-b0-ec-81-1d\WpadDecisionTime = 00b1908cc188db01 LwGHftN.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2812 wrapprompt.exe 2812 wrapprompt.exe 2812 wrapprompt.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2688 2025-02-27_f7ecddf6c68fa682bec8a847421c519b_smoke-loader_wapomi.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1856 wrote to memory of 2212 1856 2025-02-27_f7ecddf6c68fa682bec8a847421c519b_smoke-loader_wapomi.exe 30 PID 1856 wrote to memory of 2212 1856 2025-02-27_f7ecddf6c68fa682bec8a847421c519b_smoke-loader_wapomi.exe 30 PID 1856 wrote to memory of 2212 1856 2025-02-27_f7ecddf6c68fa682bec8a847421c519b_smoke-loader_wapomi.exe 30 PID 1856 wrote to memory of 2212 1856 2025-02-27_f7ecddf6c68fa682bec8a847421c519b_smoke-loader_wapomi.exe 30 PID 1856 wrote to memory of 2688 1856 2025-02-27_f7ecddf6c68fa682bec8a847421c519b_smoke-loader_wapomi.exe 31 PID 1856 wrote to memory of 2688 1856 2025-02-27_f7ecddf6c68fa682bec8a847421c519b_smoke-loader_wapomi.exe 31 PID 1856 wrote to memory of 2688 1856 2025-02-27_f7ecddf6c68fa682bec8a847421c519b_smoke-loader_wapomi.exe 31 PID 1856 wrote to memory of 2688 1856 2025-02-27_f7ecddf6c68fa682bec8a847421c519b_smoke-loader_wapomi.exe 31 PID 2852 wrote to memory of 2820 2852 wrapprompt.exe 35 PID 2852 wrote to memory of 2820 2852 wrapprompt.exe 35 PID 2852 wrote to memory of 2820 2852 wrapprompt.exe 35 PID 2852 wrote to memory of 2820 2852 wrapprompt.exe 35 PID 2852 wrote to memory of 2812 2852 wrapprompt.exe 36 PID 2852 wrote to memory of 2812 2852 wrapprompt.exe 36 PID 2852 wrote to memory of 2812 2852 wrapprompt.exe 36 PID 2852 wrote to memory of 2812 2852 wrapprompt.exe 36 PID 2212 wrote to memory of 832 2212 LwGHftN.exe 38 PID 2212 wrote to memory of 832 2212 LwGHftN.exe 38 PID 2212 wrote to memory of 832 2212 LwGHftN.exe 38 PID 2212 wrote to memory of 832 2212 LwGHftN.exe 38 PID 2820 wrote to memory of 1692 2820 LwGHftN.exe 40 PID 2820 wrote to memory of 1692 2820 LwGHftN.exe 40 PID 2820 wrote to memory of 1692 2820 LwGHftN.exe 40 PID 2820 wrote to memory of 1692 2820 LwGHftN.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-02-27_f7ecddf6c68fa682bec8a847421c519b_smoke-loader_wapomi.exe"C:\Users\Admin\AppData\Local\Temp\2025-02-27_f7ecddf6c68fa682bec8a847421c519b_smoke-loader_wapomi.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\LwGHftN.exeC:\Users\Admin\AppData\Local\Temp\LwGHftN.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\65e7449b.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:832
-
-
-
C:\Users\Admin\AppData\Local\Temp\2025-02-27_f7ecddf6c68fa682bec8a847421c519b_smoke-loader_wapomi.exe--32c43fe92⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:2688
-
-
C:\Windows\SysWOW64\wrapprompt.exe"C:\Windows\SysWOW64\wrapprompt.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\TEMP\LwGHftN.exeC:\Windows\TEMP\LwGHftN.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Windows\TEMP\614d476f.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:1692
-
-
-
C:\Windows\SysWOW64\wrapprompt.exe--e32a59602⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
272KB
MD5cc37570189fc860549990fc7a7be2511
SHA1901934620a71f2d86c2c37e8835203d2fe454488
SHA2568b1057b19ea95a6f8830616d98d8281366193e324581163b64a1ef819fbb2136
SHA5129977b6f78cf2dfd1073d04d93014b5fd9fbc6acd4bef8fb10e56d2b28a360bff0b442a459b97aa05703c33aed866fd36c2ccadf41f980571a7001927fd7e96cc
-
Filesize
31KB
MD554ba9797a17405674ded492c0bafa2c9
SHA1961c3551d369ca72b2c7140f276f375475c615e2
SHA2563a22792c86aeb10cb65791cffdd039fbd687feabb84e5897197abd8c9da01242
SHA512899adc144f9f53cb54dcc3d61ebfaced5ceecfd8b59fb1597516025cd1b99b4a0151b7354024a575d0610e1243497bdd063b8b3437ca931f2fb31a27e5a30d8c
-
Filesize
189B
MD56461252ca6f478eff43724f6fe3cc560
SHA1a5438e1c6fec24ef1ddd305fb7deb5d3dc1d5637
SHA256d92243c888843dba45333689c1a583a59408cc6ac85e36771548d5d096c1fe3f
SHA51245a69106c623bc3ae0d551ee502c0f8fde99572bbfe817e491938caff37764ff6018fb90718aee8df36e765247e134b0757e40ed188f0a3f0021dcd768fdec01
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
Filesize
135B
MD5470b013ae7963ebfe9e2108098dadaa5
SHA1896c71631c23e31e713c059d515e64274817be47
SHA2569e7bfebb2ebad9c2483ddd15548f1585cab1baa7f3157a9503f1ef3cfd66d38b
SHA512b254a41346c10da5ce97fc64d2bef197f0b98d0c46b961f2129ee482f7b0b56199571f50acb6f107bd9d20ba138dcbf16e67f830e71961f4f39eb572b85ddee1