Analysis
-
max time kernel
85s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 01:53
Static task
static1
Behavioral task
behavioral1
Sample
17ce57ab9ff4cbad82e635233b0e96d8603409cd046e85b604da20c066ec419cN.exe
Resource
win7-20240903-en
General
-
Target
17ce57ab9ff4cbad82e635233b0e96d8603409cd046e85b604da20c066ec419cN.exe
-
Size
445KB
-
MD5
33b394a638dde9affb689b973c332c10
-
SHA1
407ad1519ebbbda772711f924c2c5fa3b1cfd17e
-
SHA256
17ce57ab9ff4cbad82e635233b0e96d8603409cd046e85b604da20c066ec419c
-
SHA512
ddacc9438788c4a39bda979b2979295b30aabc90085871d0c5c755abef85f3b7a59081d205e2cc5e766750cc14c5f7bfbfe12536b473d57d1d4e1accc0ea2df1
-
SSDEEP
3072:urAebkSuIgrIgp2XUJGCHwxn08peEoVgVs6L2cEJNQ7LzVCLVtjtVK:tIgrIgulMXVgb6NezkJvQ
Malware Config
Extracted
bdaejec
ddos.dnsnb8.net
Signatures
-
Detects Bdaejec Backdoor. 1 IoCs
Bdaejec is backdoor written in C++.
resource yara_rule behavioral1/memory/2492-74-0x00000000009C0000-0x00000000009C9000-memory.dmp family_bdaejec_backdoor -
resource yara_rule behavioral1/files/0x000800000001739c-23.dat aspack_v212_v242 -
Executes dropped EXE 2 IoCs
pid Process 2532 17ce57ab9ff4cbad82e635233b0e96d8603409cd046e85b604da20c066ec419cNmgr.exe 2492 nUUAXg.exe -
Loads dropped DLL 6 IoCs
pid Process 1984 17ce57ab9ff4cbad82e635233b0e96d8603409cd046e85b604da20c066ec419cN.exe 1984 17ce57ab9ff4cbad82e635233b0e96d8603409cd046e85b604da20c066ec419cN.exe 1984 17ce57ab9ff4cbad82e635233b0e96d8603409cd046e85b604da20c066ec419cN.exe 1984 17ce57ab9ff4cbad82e635233b0e96d8603409cd046e85b604da20c066ec419cN.exe 2532 17ce57ab9ff4cbad82e635233b0e96d8603409cd046e85b604da20c066ec419cNmgr.exe 2532 17ce57ab9ff4cbad82e635233b0e96d8603409cd046e85b604da20c066ec419cNmgr.exe -
resource yara_rule behavioral1/memory/2532-21-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2532-29-0x0000000000400000-0x000000000045C000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ACCICONS.EXE nUUAXg.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\INFOPATH.EXE nUUAXg.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe nUUAXg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\policytool.exe nUUAXg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\kinit.exe nUUAXg.exe File opened for modification C:\Program Files\Java\jre7\bin\orbd.exe nUUAXg.exe File opened for modification C:\Program Files\Windows Journal\Journal.exe nUUAXg.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Eula.exe nUUAXg.exe File opened for modification C:\Program Files (x86)\Windows Mail\wab.exe nUUAXg.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\shvlzm.exe nUUAXg.exe File opened for modification C:\Program Files\Mozilla Firefox\default-browser-agent.exe nUUAXg.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe nUUAXg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaw.exe nUUAXg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmid.exe nUUAXg.exe File opened for modification C:\Program Files\Java\jre7\bin\jp2launcher.exe nUUAXg.exe File opened for modification C:\Program Files\Java\jre7\bin\rmiregistry.exe nUUAXg.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\MineSweeper.exe nUUAXg.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GRAPH.EXE nUUAXg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmap.exe nUUAXg.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe nUUAXg.exe File opened for modification C:\Program Files\Mozilla Firefox\private_browsing.exe nUUAXg.exe File opened for modification C:\Program Files\Windows Mail\WinMail.exe nUUAXg.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\FreeCell.exe nUUAXg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateSetup.exe nUUAXg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java-rmi.exe nUUAXg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javap.exe nUUAXg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\native2ascii.exe nUUAXg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ssvagent.exe nUUAXg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec.exe nUUAXg.exe File opened for modification C:\Program Files\Java\jre7\bin\kinit.exe nUUAXg.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONENOTE.EXE nUUAXg.exe File opened for modification C:\Program Files\7-Zip\7zG.exe nUUAXg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\apt.exe nUUAXg.exe File opened for modification C:\Program Files\Java\jre7\bin\rmid.exe nUUAXg.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\Setup.exe nUUAXg.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SCANPST.EXE nUUAXg.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe nUUAXg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\wsgen.exe nUUAXg.exe File opened for modification C:\Program Files\Windows Journal\PDIALOG.exe nUUAXg.exe File opened for modification C:\Program Files\Windows Mail\wab.exe nUUAXg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateBroker.exe nUUAXg.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\VPREVIEW.EXE nUUAXg.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe nUUAXg.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GROOVEMN.EXE nUUAXg.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe nUUAXg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\ktab.exe nUUAXg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ktab.exe nUUAXg.exe File opened for modification C:\Program Files\Java\jre7\bin\javaws.exe nUUAXg.exe File opened for modification C:\Program Files\Java\jre7\bin\keytool.exe nUUAXg.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe nUUAXg.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SELFCERT.EXE nUUAXg.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\Uninstall.exe nUUAXg.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe nUUAXg.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe nUUAXg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaws.exe nUUAXg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\unpack200.exe nUUAXg.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe nUUAXg.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE nUUAXg.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\SC_Reader.exe nUUAXg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdate.exe nUUAXg.exe File opened for modification C:\Program Files\DVD Maker\DVDMaker.exe nUUAXg.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe nUUAXg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jinfo.exe nUUAXg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\pack200.exe nUUAXg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2708 2532 WerFault.exe 32 3056 1984 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 17ce57ab9ff4cbad82e635233b0e96d8603409cd046e85b604da20c066ec419cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 17ce57ab9ff4cbad82e635233b0e96d8603409cd046e85b604da20c066ec419cNmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nUUAXg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1984 wrote to memory of 2532 1984 17ce57ab9ff4cbad82e635233b0e96d8603409cd046e85b604da20c066ec419cN.exe 32 PID 1984 wrote to memory of 2532 1984 17ce57ab9ff4cbad82e635233b0e96d8603409cd046e85b604da20c066ec419cN.exe 32 PID 1984 wrote to memory of 2532 1984 17ce57ab9ff4cbad82e635233b0e96d8603409cd046e85b604da20c066ec419cN.exe 32 PID 1984 wrote to memory of 2532 1984 17ce57ab9ff4cbad82e635233b0e96d8603409cd046e85b604da20c066ec419cN.exe 32 PID 1984 wrote to memory of 2492 1984 17ce57ab9ff4cbad82e635233b0e96d8603409cd046e85b604da20c066ec419cN.exe 33 PID 1984 wrote to memory of 2492 1984 17ce57ab9ff4cbad82e635233b0e96d8603409cd046e85b604da20c066ec419cN.exe 33 PID 1984 wrote to memory of 2492 1984 17ce57ab9ff4cbad82e635233b0e96d8603409cd046e85b604da20c066ec419cN.exe 33 PID 1984 wrote to memory of 2492 1984 17ce57ab9ff4cbad82e635233b0e96d8603409cd046e85b604da20c066ec419cN.exe 33 PID 1984 wrote to memory of 3056 1984 17ce57ab9ff4cbad82e635233b0e96d8603409cd046e85b604da20c066ec419cN.exe 35 PID 1984 wrote to memory of 3056 1984 17ce57ab9ff4cbad82e635233b0e96d8603409cd046e85b604da20c066ec419cN.exe 35 PID 1984 wrote to memory of 3056 1984 17ce57ab9ff4cbad82e635233b0e96d8603409cd046e85b604da20c066ec419cN.exe 35 PID 1984 wrote to memory of 3056 1984 17ce57ab9ff4cbad82e635233b0e96d8603409cd046e85b604da20c066ec419cN.exe 35 PID 2492 wrote to memory of 1792 2492 nUUAXg.exe 37 PID 2492 wrote to memory of 1792 2492 nUUAXg.exe 37 PID 2492 wrote to memory of 1792 2492 nUUAXg.exe 37 PID 2492 wrote to memory of 1792 2492 nUUAXg.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\17ce57ab9ff4cbad82e635233b0e96d8603409cd046e85b604da20c066ec419cN.exe"C:\Users\Admin\AppData\Local\Temp\17ce57ab9ff4cbad82e635233b0e96d8603409cd046e85b604da20c066ec419cN.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\17ce57ab9ff4cbad82e635233b0e96d8603409cd046e85b604da20c066ec419cNmgr.exeC:\Users\Admin\AppData\Local\Temp\17ce57ab9ff4cbad82e635233b0e96d8603409cd046e85b604da20c066ec419cNmgr.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2532 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2532 -s 1803⤵
- Program crash
PID:2708
-
-
-
C:\Users\Admin\AppData\Local\Temp\nUUAXg.exeC:\Users\Admin\AppData\Local\Temp\nUUAXg.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\20fb6887.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:1792
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1984 -s 1682⤵
- Program crash
PID:3056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WUBCGJ0A\k2[1].rar
Filesize4B
MD5d3b07384d113edec49eaa6238ad5ff00
SHA1f1d2d2f924e986ac86fdf7b36c94bcdf32beec15
SHA256b5bb9d8014a0f9b1d61e21e796d78dccdf1352f23cd32812f4850b878ae4944c
SHA5120cf9180a764aba863a67b6d72f0918bc131c6772642cb2dce5a34f0a702f9470ddc2bf125c12198b1995c233c34b4afd346c54a2334c350a948a51b6e8b4e6b6
-
Filesize
187B
MD5217b5d79241b009a8260845d515d7cd3
SHA1dad84559a0b89fe6c8e62f077062bda838593d02
SHA2561d8ae1ab933c11cfe267bbda08b83293151f6357ba62248a624bac069fbac59c
SHA512a35472f62a28060c50105c585a58c87fe36afe67a93d039ff18070729f5aa33d393a74887cfec7b8e6cfe9aab48fb38ccf04efeee1c8c3a69848dd081c43b67f
-
Filesize
4B
MD520879c987e2f9a916e578386d499f629
SHA1c7b33ddcc42361fdb847036fc07e880b81935d5d
SHA2569f2981a7cc4d40a2a409dc895de64253acd819d7c0011c8e80b86fe899464e31
SHA512bcdde1625364dd6dd143b45bdcec8d59cf8982aff33790d390b839f3869e0e815684568b14b555a596d616252aeeaa98dac2e6e551c9095ea11a575ff25ff84f
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
\Users\Admin\AppData\Local\Temp\17ce57ab9ff4cbad82e635233b0e96d8603409cd046e85b604da20c066ec419cNmgr.exe
Filesize354KB
MD5a8245f71e4e4aff10e574300abd2bcc2
SHA17ea3ae53a0697e526c6bc877b103b390af042d7a
SHA2567bf945e4d87567106bfe8980b4fe1e6482578ab91fa9d82426c804ae5c3f2546
SHA5128c32f1f55c0475ce06ddbd3db80d529addb401089bd61491641d2e2c0c36020eabc5a947735388ae7a90514c543cb29450afa13b1e3f90387e432b62d4628978
-
Filesize
1.2MB
MD5d124f55b9393c976963407dff51ffa79
SHA12c7bbedd79791bfb866898c85b504186db610b5d
SHA256ea1e16247c848c8c171c4cd1fa17bc5a018a1fcb0c0dac25009066b6667b8eef
SHA512278fe3a4b1fbbe700e4f4483b610133e975e36e101455661d5197bd892a68839b9d555499040d200c92aefa9e3819380e395c0cd85d5fc845c6364d128a8cf06
-
Filesize
1.1MB
MD59b98d47916ead4f69ef51b56b0c2323c
SHA1290a80b4ded0efc0fd00816f373fcea81a521330
SHA25696e0ae104c9662d0d20fdf59844c2d18334e5847b6c4fc7f8ce4b3b87f39887b
SHA51268b67021f228d8d71df4deb0b6388558b2f935a6aa466a12199cd37ada47ee588ea407b278d190d3a498b0ef3f5f1a2573a469b7ea5561ab2e7055c45565fe94