Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
20-10-2024 18:14
Static task
static1
Behavioral task
behavioral1
Sample
ad7a629f3ee18fe2694c7109f1957e33b462b4198b9c6fc114e655177b04ebe0N.exe
Resource
win7-20240729-en
General
-
Target
ad7a629f3ee18fe2694c7109f1957e33b462b4198b9c6fc114e655177b04ebe0N.exe
-
Size
26KB
-
MD5
87461b6d1092c4d15733c4ecbf8bef80
-
SHA1
0f554980bd341913e61f29e1f7912a5951aa6781
-
SHA256
ad7a629f3ee18fe2694c7109f1957e33b462b4198b9c6fc114e655177b04ebe0
-
SHA512
d9dd182a894302031ba5a55bc709956d78ebb81f401e8dbfbcdcbb9630d404e285ecbfbf989e4e0f1607092763856c70aa81c167829494fbe6569fe87d69a843
-
SSDEEP
768:Td5u7mNGtyVfbKqQGPL4vzZq2o9W7G8xBug:Td5z/fWJGCq2iW7H
Malware Config
Extracted
bdaejec
ddos.dnsnb8.net
Signatures
-
Detects Bdaejec Backdoor. 1 IoCs
Bdaejec is backdoor written in C++.
resource yara_rule behavioral1/memory/1496-35-0x0000000000280000-0x0000000000289000-memory.dmp family_bdaejec_backdoor -
resource yara_rule behavioral1/files/0x000b00000001225e-2.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 1496 JNEwqQ.exe -
Loads dropped DLL 2 IoCs
pid Process 1760 ad7a629f3ee18fe2694c7109f1957e33b462b4198b9c6fc114e655177b04ebe0N.exe 1760 ad7a629f3ee18fe2694c7109f1957e33b462b4198b9c6fc114e655177b04ebe0N.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jabswitch.exe JNEwqQ.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\keytool.exe JNEwqQ.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\kinit.exe JNEwqQ.exe File opened for modification C:\Program Files\Java\jre7\bin\jabswitch.exe JNEwqQ.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice.exe JNEwqQ.exe File opened for modification C:\Program Files\Windows Defender\MpCmdRun.exe JNEwqQ.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\A3DUtility.exe JNEwqQ.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GRAPH.EXE JNEwqQ.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\WORDICON.EXE JNEwqQ.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\extcheck.exe JNEwqQ.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jabswitch.exe JNEwqQ.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java-rmi.exe JNEwqQ.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javah.exe JNEwqQ.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jdb.exe JNEwqQ.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstack.exe JNEwqQ.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\pack200.exe JNEwqQ.exe File opened for modification C:\Program Files\Java\jre7\bin\rmid.exe JNEwqQ.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CLVIEW.EXE JNEwqQ.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOSYNC.EXE JNEwqQ.exe File opened for modification C:\Program Files (x86)\Windows Mail\wab.exe JNEwqQ.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jarsigner.exe JNEwqQ.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ktab.exe JNEwqQ.exe File opened for modification C:\Program Files\Java\jre7\bin\unpack200.exe JNEwqQ.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\PurblePlace.exe JNEwqQ.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe JNEwqQ.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroBroker.exe JNEwqQ.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe JNEwqQ.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AdobeCollabSync.exe JNEwqQ.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\misc.exe JNEwqQ.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE JNEwqQ.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe JNEwqQ.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\LogTransport2.exe JNEwqQ.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler.exe JNEwqQ.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateSetup.exe JNEwqQ.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\INFOPATH.EXE JNEwqQ.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\orbd.exe JNEwqQ.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec.exe JNEwqQ.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\chkrzm.exe JNEwqQ.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateBroker.exe JNEwqQ.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GROOVEMN.EXE JNEwqQ.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOUC.EXE JNEwqQ.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe JNEwqQ.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java.exe JNEwqQ.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstat.exe JNEwqQ.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\policytool.exe JNEwqQ.exe File opened for modification C:\Program Files\Java\jre7\bin\javacpl.exe JNEwqQ.exe File opened for modification C:\Program Files\Mozilla Firefox\minidump-analyzer.exe JNEwqQ.exe File opened for modification C:\Program Files\Mozilla Firefox\private_browsing.exe JNEwqQ.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javadoc.exe JNEwqQ.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java-rmi.exe JNEwqQ.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\servertool.exe JNEwqQ.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\tnameserv.exe JNEwqQ.exe File opened for modification C:\Program Files\Java\jre7\bin\javaw.exe JNEwqQ.exe File opened for modification C:\Program Files\Java\jre7\bin\jp2launcher.exe JNEwqQ.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe JNEwqQ.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jsadebugd.exe JNEwqQ.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\kinit.exe JNEwqQ.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\serialver.exe JNEwqQ.exe File opened for modification C:\Program Files\Java\jre7\bin\pack200.exe JNEwqQ.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroTextExtractor.exe JNEwqQ.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSTORE.EXE JNEwqQ.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PPTICO.EXE JNEwqQ.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmap.exe JNEwqQ.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmc.exe JNEwqQ.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad7a629f3ee18fe2694c7109f1957e33b462b4198b9c6fc114e655177b04ebe0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JNEwqQ.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1760 wrote to memory of 1496 1760 ad7a629f3ee18fe2694c7109f1957e33b462b4198b9c6fc114e655177b04ebe0N.exe 30 PID 1760 wrote to memory of 1496 1760 ad7a629f3ee18fe2694c7109f1957e33b462b4198b9c6fc114e655177b04ebe0N.exe 30 PID 1760 wrote to memory of 1496 1760 ad7a629f3ee18fe2694c7109f1957e33b462b4198b9c6fc114e655177b04ebe0N.exe 30 PID 1760 wrote to memory of 1496 1760 ad7a629f3ee18fe2694c7109f1957e33b462b4198b9c6fc114e655177b04ebe0N.exe 30 PID 1496 wrote to memory of 2908 1496 JNEwqQ.exe 31 PID 1496 wrote to memory of 2908 1496 JNEwqQ.exe 31 PID 1496 wrote to memory of 2908 1496 JNEwqQ.exe 31 PID 1496 wrote to memory of 2908 1496 JNEwqQ.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad7a629f3ee18fe2694c7109f1957e33b462b4198b9c6fc114e655177b04ebe0N.exe"C:\Users\Admin\AppData\Local\Temp\ad7a629f3ee18fe2694c7109f1957e33b462b4198b9c6fc114e655177b04ebe0N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\JNEwqQ.exeC:\Users\Admin\AppData\Local\Temp\JNEwqQ.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\6fff07ee.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:2908
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4B
MD520879c987e2f9a916e578386d499f629
SHA1c7b33ddcc42361fdb847036fc07e880b81935d5d
SHA2569f2981a7cc4d40a2a409dc895de64253acd819d7c0011c8e80b86fe899464e31
SHA512bcdde1625364dd6dd143b45bdcec8d59cf8982aff33790d390b839f3869e0e815684568b14b555a596d616252aeeaa98dac2e6e551c9095ea11a575ff25ff84f
-
Filesize
187B
MD58132fd53942e7e3ae4e60ae7380eb0d8
SHA17917eda148f29ca9076d3ff393eeb07667505c2d
SHA25670c019aa8d3f84ce10caeddea772026cba05d4600597ff414a4a96b2826291fe
SHA512d7016508b237de168d0bdfd8ca6faa00fb98a25adb240796ded9b43d58843df09a44a3636ca71d77a7e3abfae745e52bd1ef463ef6b3e074981adb80e2374aee
-
Filesize
15KB
MD545ca3d2ef61f6df0618a944516b2e1d3
SHA11b907fdeaa3074d18c93f1fb6c0ac69714456007
SHA2569cc926b973ac2c27887d5fd6a82015922dfc06e927d1f37565bd082543333a02
SHA5128ee16cc60857b0a2687a35050e2f7d003d98f24a99ea4bd7b290842bfa2bc3b8e2bf184cf2e187c3a24e1cd003297d7710b8a1e406b16a5d066f2a944b8e4702