Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 04:11
Behavioral task
behavioral1
Sample
miMGON.exe
Resource
win7-20240903-en
General
-
Target
miMGON.exe
-
Size
15KB
-
MD5
56b2c3810dba2e939a8bb9fa36d3cf96
-
SHA1
99ee31cd4b0d6a4b62779da36e0eeecdd80589fc
-
SHA256
4354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
-
SHA512
27812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
SSDEEP
384:7XZQaD7U8iu4YsAa7ZA0UvH2lsRv21yW7GbAxur6+Y9PffPz:1QGPL4vzZq2o9W7GsxBbPr
Malware Config
Extracted
bdaejec
ddos.dnsnb8.net
Signatures
-
Detects Bdaejec Backdoor. 2 IoCs
Bdaejec is backdoor written in C++.
resource yara_rule behavioral1/memory/2684-0-0x0000000000370000-0x0000000000379000-memory.dmp family_bdaejec_backdoor behavioral1/memory/2684-18-0x0000000000370000-0x0000000000379000-memory.dmp family_bdaejec_backdoor -
Deletes itself 1 IoCs
pid Process 2580 cmd.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe miMGON.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javac.exe miMGON.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe miMGON.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe miMGON.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler64.exe miMGON.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\IEContentService.exe miMGON.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONENOTEM.EXE miMGON.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaw.exe miMGON.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\schemagen.exe miMGON.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\rmid.exe miMGON.exe File opened for modification C:\Program Files\Java\jre7\bin\java-rmi.exe miMGON.exe File opened for modification C:\Program Files\Windows Journal\PDIALOG.exe miMGON.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javadoc.exe miMGON.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstat.exe miMGON.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\shvlzm.exe miMGON.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\LogTransport2.exe miMGON.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\appletviewer.exe miMGON.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\xjc.exe miMGON.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jp2launcher.exe miMGON.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ktab.exe miMGON.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec64.exe miMGON.exe File opened for modification C:\Program Files\Java\jre7\bin\javacpl.exe miMGON.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe miMGON.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\INFOPATH.EXE miMGON.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOHTMED.EXE miMGON.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\wsimport.exe miMGON.exe File opened for modification C:\Program Files\Java\jre7\bin\servertool.exe miMGON.exe File opened for modification C:\Program Files\Mozilla Firefox\private_browsing.exe miMGON.exe File opened for modification C:\Program Files\Windows Journal\Journal.exe miMGON.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{5059450D-F254-431C-8EC5-1212E61F2D77}\chrome_installer.exe miMGON.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GRAPH.EXE miMGON.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE miMGON.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSTORDB.EXE miMGON.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSTORE.EXE miMGON.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe miMGON.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\klist.exe miMGON.exe File opened for modification C:\Program Files\Java\jre7\bin\jp2launcher.exe miMGON.exe File opened for modification C:\Program Files\Windows Mail\WinMail.exe miMGON.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SETLANG.EXE miMGON.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaw.exe miMGON.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\kinit.exe miMGON.exe File opened for modification C:\Program Files\Java\jre7\bin\javaw.exe miMGON.exe File opened for modification C:\Program Files\Java\jre7\bin\ktab.exe miMGON.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe miMGON.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE miMGON.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\SC_Reader.exe miMGON.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe miMGON.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java-rmi.exe miMGON.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\orbd.exe miMGON.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmic.exe miMGON.exe File opened for modification C:\Program Files\Java\jre7\bin\orbd.exe miMGON.exe File opened for modification C:\Program Files\Java\jre7\bin\pack200.exe miMGON.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AdobeCollabSync.exe miMGON.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GROOVEMN.EXE miMGON.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE miMGON.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\SpiderSolitaire.exe miMGON.exe File opened for modification C:\Program Files\DVD Maker\DVDMaker.exe miMGON.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\idlj.exe miMGON.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jinfo.exe miMGON.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\ktab.exe miMGON.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\serialver.exe miMGON.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaws.exe miMGON.exe File opened for modification C:\Program Files\Java\jre7\bin\klist.exe miMGON.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\bckgzm.exe miMGON.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language miMGON.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2684 wrote to memory of 2580 2684 miMGON.exe 31 PID 2684 wrote to memory of 2580 2684 miMGON.exe 31 PID 2684 wrote to memory of 2580 2684 miMGON.exe 31 PID 2684 wrote to memory of 2580 2684 miMGON.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\miMGON.exe"C:\Users\Admin\AppData\Local\Temp\miMGON.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\2f4c0c33.bat" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2580
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
187B
MD57bcf4cb7b557386b7ef818067c583761
SHA115d141750f7088a393c5f652c4f27b56e16187c9
SHA256a6cc7763096750cedd1dc4d379cc62efe2228177b4f90f6c516444f9fd8a1ce6
SHA512071895a1cfb614bca3e612dbe18a557cac2f59f2d973d34f9fc40ad03b234025ccb9c7828d0108a6d0caba8799a4d7552164f87ada01b2cbe5959c8e0a626901