Analysis
-
max time kernel
115s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 01:53
Static task
static1
Behavioral task
behavioral1
Sample
17ce57ab9ff4cbad82e635233b0e96d8603409cd046e85b604da20c066ec419cN.exe
Resource
win7-20240903-en
General
-
Target
17ce57ab9ff4cbad82e635233b0e96d8603409cd046e85b604da20c066ec419cN.exe
-
Size
445KB
-
MD5
33b394a638dde9affb689b973c332c10
-
SHA1
407ad1519ebbbda772711f924c2c5fa3b1cfd17e
-
SHA256
17ce57ab9ff4cbad82e635233b0e96d8603409cd046e85b604da20c066ec419c
-
SHA512
ddacc9438788c4a39bda979b2979295b30aabc90085871d0c5c755abef85f3b7a59081d205e2cc5e766750cc14c5f7bfbfe12536b473d57d1d4e1accc0ea2df1
-
SSDEEP
3072:urAebkSuIgrIgp2XUJGCHwxn08peEoVgVs6L2cEJNQ7LzVCLVtjtVK:tIgrIgulMXVgb6NezkJvQ
Malware Config
Extracted
bdaejec
ddos.dnsnb8.net
Signatures
-
Detects Bdaejec Backdoor. 1 IoCs
Bdaejec is backdoor written in C++.
resource yara_rule behavioral2/memory/2724-57-0x0000000000BD0000-0x0000000000BD9000-memory.dmp family_bdaejec_backdoor -
resource yara_rule behavioral2/files/0x000700000002359f-9.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation nUUAXg.exe -
Executes dropped EXE 2 IoCs
pid Process 1464 17ce57ab9ff4cbad82e635233b0e96d8603409cd046e85b604da20c066ec419cNmgr.exe 2724 nUUAXg.exe -
Loads dropped DLL 1 IoCs
pid Process 1464 17ce57ab9ff4cbad82e635233b0e96d8603409cd046e85b604da20c066ec419cNmgr.exe -
resource yara_rule behavioral2/memory/1464-12-0x0000000000400000-0x000000000045C000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk-1.8\bin\klist.exe nUUAXg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ADelRCP.exe nUUAXg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jp2launcher.exe nUUAXg.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DWTRIG20.EXE nUUAXg.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\ScreenSketch.exe nUUAXg.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\misc.exe nUUAXg.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe nUUAXg.exe File opened for modification C:\Program Files\Mozilla Firefox\minidump-analyzer.exe nUUAXg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jabswitch.exe nUUAXg.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoadfsb.exe nUUAXg.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe nUUAXg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jarsigner.exe nUUAXg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmic.exe nUUAXg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\servertool.exe nUUAXg.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\CLVIEW.EXE nUUAXg.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\officeappguardwin32.exe nUUAXg.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\LocalBridge.exe nUUAXg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroTextExtractor.exe nUUAXg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\appletviewer.exe nUUAXg.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE nUUAXg.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SELFCERT.EXE nUUAXg.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\Wordconv.exe nUUAXg.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_x64__8wekyb3d8bbwe\Solitaire.exe nUUAXg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstatd.exe nUUAXg.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOICONS.EXE nUUAXg.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SETLANG.EXE nUUAXg.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxSpeechToTextOverlay_1.17.29001.0_x64__8wekyb3d8bbwe\SpeechToTextOverlay64-Retail.exe nUUAXg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jrunscript.exe nUUAXg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javacpl.exe nUUAXg.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoev.exe nUUAXg.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\filecompare.exe nUUAXg.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Smart Tag\SmartTagInstall.exe nUUAXg.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\EQUATION\eqnedt32.exe nUUAXg.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\createdump.exe nUUAXg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\kinit.exe nUUAXg.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\123.0.6312.123\chrome_installer.exe nUUAXg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javacpl.exe nUUAXg.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\onenoteim.exe nUUAXg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AdobeCollabSync.exe nUUAXg.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe nUUAXg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\keytool.exe nUUAXg.exe File opened for modification C:\Program Files\Windows Security\BrowserCore\BrowserCore.exe nUUAXg.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_x64__8wekyb3d8bbwe\Microsoft.WebMediaExtensions.exe nUUAXg.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe nUUAXg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\xjc.exe nUUAXg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\ssvagent.exe nUUAXg.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exe nUUAXg.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\protocolhandler.exe nUUAXg.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\MixedRealityPortal.Brokered.exe nUUAXg.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.StorePurchaseApp_11811.1001.18.0_x64__8wekyb3d8bbwe\StoreExperienceHost.exe nUUAXg.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\HxOutlook.exe nUUAXg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jjs.exe nUUAXg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstat.exe nUUAXg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\pack200.exe nUUAXg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\unpack200.exe nUUAXg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java-rmi.exe nUUAXg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\kinit.exe nUUAXg.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Xbox.TCUI_1.23.28002.0_x64__8wekyb3d8bbwe\TCUI-App.exe nUUAXg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\AcroLayoutRecognizer.exe nUUAXg.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\FLTLDR.EXE nUUAXg.exe File opened for modification C:\Program Files\Windows Mail\wab.exe nUUAXg.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\NAMECONTROLSERVER.EXE nUUAXg.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Analysis Services\AS OLEDB\140\SQLDumper.exe nUUAXg.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\AppSharingHookController.exe nUUAXg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 1512 1464 WerFault.exe 90 4548 1808 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 17ce57ab9ff4cbad82e635233b0e96d8603409cd046e85b604da20c066ec419cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 17ce57ab9ff4cbad82e635233b0e96d8603409cd046e85b604da20c066ec419cNmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nUUAXg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1808 wrote to memory of 1464 1808 17ce57ab9ff4cbad82e635233b0e96d8603409cd046e85b604da20c066ec419cN.exe 90 PID 1808 wrote to memory of 1464 1808 17ce57ab9ff4cbad82e635233b0e96d8603409cd046e85b604da20c066ec419cN.exe 90 PID 1808 wrote to memory of 1464 1808 17ce57ab9ff4cbad82e635233b0e96d8603409cd046e85b604da20c066ec419cN.exe 90 PID 1808 wrote to memory of 2724 1808 17ce57ab9ff4cbad82e635233b0e96d8603409cd046e85b604da20c066ec419cN.exe 91 PID 1808 wrote to memory of 2724 1808 17ce57ab9ff4cbad82e635233b0e96d8603409cd046e85b604da20c066ec419cN.exe 91 PID 1808 wrote to memory of 2724 1808 17ce57ab9ff4cbad82e635233b0e96d8603409cd046e85b604da20c066ec419cN.exe 91 PID 2724 wrote to memory of 4968 2724 nUUAXg.exe 97 PID 2724 wrote to memory of 4968 2724 nUUAXg.exe 97 PID 2724 wrote to memory of 4968 2724 nUUAXg.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\17ce57ab9ff4cbad82e635233b0e96d8603409cd046e85b604da20c066ec419cN.exe"C:\Users\Admin\AppData\Local\Temp\17ce57ab9ff4cbad82e635233b0e96d8603409cd046e85b604da20c066ec419cN.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\17ce57ab9ff4cbad82e635233b0e96d8603409cd046e85b604da20c066ec419cNmgr.exeC:\Users\Admin\AppData\Local\Temp\17ce57ab9ff4cbad82e635233b0e96d8603409cd046e85b604da20c066ec419cNmgr.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1464 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1464 -s 4923⤵
- Program crash
PID:1512
-
-
-
C:\Users\Admin\AppData\Local\Temp\nUUAXg.exeC:\Users\Admin\AppData\Local\Temp\nUUAXg.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\67b11aa3.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:4968
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1808 -s 5042⤵
- Program crash
PID:4548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1464 -ip 14641⤵PID:2760
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1808 -ip 18081⤵PID:2320
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4008,i,10065386245627775856,6567048529106473151,262144 --variations-seed-version --mojo-platform-channel-handle=4260 /prefetch:81⤵PID:3752
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4B
MD5d3b07384d113edec49eaa6238ad5ff00
SHA1f1d2d2f924e986ac86fdf7b36c94bcdf32beec15
SHA256b5bb9d8014a0f9b1d61e21e796d78dccdf1352f23cd32812f4850b878ae4944c
SHA5120cf9180a764aba863a67b6d72f0918bc131c6772642cb2dce5a34f0a702f9470ddc2bf125c12198b1995c233c34b4afd346c54a2334c350a948a51b6e8b4e6b6
-
C:\Users\Admin\AppData\Local\Temp\17ce57ab9ff4cbad82e635233b0e96d8603409cd046e85b604da20c066ec419cNmgr.exe
Filesize354KB
MD5a8245f71e4e4aff10e574300abd2bcc2
SHA17ea3ae53a0697e526c6bc877b103b390af042d7a
SHA2567bf945e4d87567106bfe8980b4fe1e6482578ab91fa9d82426c804ae5c3f2546
SHA5128c32f1f55c0475ce06ddbd3db80d529addb401089bd61491641d2e2c0c36020eabc5a947735388ae7a90514c543cb29450afa13b1e3f90387e432b62d4628978
-
Filesize
4B
MD520879c987e2f9a916e578386d499f629
SHA1c7b33ddcc42361fdb847036fc07e880b81935d5d
SHA2569f2981a7cc4d40a2a409dc895de64253acd819d7c0011c8e80b86fe899464e31
SHA512bcdde1625364dd6dd143b45bdcec8d59cf8982aff33790d390b839f3869e0e815684568b14b555a596d616252aeeaa98dac2e6e551c9095ea11a575ff25ff84f
-
Filesize
187B
MD5f6ef48a32e004b4ffae6f9497b807fd9
SHA10efc7072af8ac3b2a299cad40cdad0c005fb0b9e
SHA25655cad7bad9427773d21bd4f5d1c903445d33cf76055fc3dc9ef6b9ae7c40144a
SHA51270b41a9a5ccd124e9e1e2200729b1b3c8f2d983681795178332a2888336292f425836535a8d423ca5a2884499ce867617966ffff83b230d1e76aeb6b76729b29
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
Filesize
1.6MB
MD54f3387277ccbd6d1f21ac5c07fe4ca68
SHA1e16506f662dc92023bf82def1d621497c8ab5890
SHA256767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac
SHA5129da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219