Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    20-10-2024 18:14

General

  • Target

    ad7a629f3ee18fe2694c7109f1957e33b462b4198b9c6fc114e655177b04ebe0N.exe

  • Size

    26KB

  • MD5

    87461b6d1092c4d15733c4ecbf8bef80

  • SHA1

    0f554980bd341913e61f29e1f7912a5951aa6781

  • SHA256

    ad7a629f3ee18fe2694c7109f1957e33b462b4198b9c6fc114e655177b04ebe0

  • SHA512

    d9dd182a894302031ba5a55bc709956d78ebb81f401e8dbfbcdcbb9630d404e285ecbfbf989e4e0f1607092763856c70aa81c167829494fbe6569fe87d69a843

  • SSDEEP

    768:Td5u7mNGtyVfbKqQGPL4vzZq2o9W7G8xBug:Td5z/fWJGCq2iW7H

Malware Config

Extracted

Family

bdaejec

C2

ddos.dnsnb8.net

Signatures

  • Bdaejec

    Bdaejec is a backdoor written in C++.

  • Detects Bdaejec Backdoor. 1 IoCs

    Bdaejec is backdoor written in C++.

  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ad7a629f3ee18fe2694c7109f1957e33b462b4198b9c6fc114e655177b04ebe0N.exe
    "C:\Users\Admin\AppData\Local\Temp\ad7a629f3ee18fe2694c7109f1957e33b462b4198b9c6fc114e655177b04ebe0N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1760
    • C:\Users\Admin\AppData\Local\Temp\JNEwqQ.exe
      C:\Users\Admin\AppData\Local\Temp\JNEwqQ.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1496
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\6fff07ee.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2908

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3CBC760D.exe

    Filesize

    4B

    MD5

    20879c987e2f9a916e578386d499f629

    SHA1

    c7b33ddcc42361fdb847036fc07e880b81935d5d

    SHA256

    9f2981a7cc4d40a2a409dc895de64253acd819d7c0011c8e80b86fe899464e31

    SHA512

    bcdde1625364dd6dd143b45bdcec8d59cf8982aff33790d390b839f3869e0e815684568b14b555a596d616252aeeaa98dac2e6e551c9095ea11a575ff25ff84f

  • C:\Users\Admin\AppData\Local\Temp\6fff07ee.bat

    Filesize

    187B

    MD5

    8132fd53942e7e3ae4e60ae7380eb0d8

    SHA1

    7917eda148f29ca9076d3ff393eeb07667505c2d

    SHA256

    70c019aa8d3f84ce10caeddea772026cba05d4600597ff414a4a96b2826291fe

    SHA512

    d7016508b237de168d0bdfd8ca6faa00fb98a25adb240796ded9b43d58843df09a44a3636ca71d77a7e3abfae745e52bd1ef463ef6b3e074981adb80e2374aee

  • \Users\Admin\AppData\Local\Temp\JNEwqQ.exe

    Filesize

    15KB

    MD5

    45ca3d2ef61f6df0618a944516b2e1d3

    SHA1

    1b907fdeaa3074d18c93f1fb6c0ac69714456007

    SHA256

    9cc926b973ac2c27887d5fd6a82015922dfc06e927d1f37565bd082543333a02

    SHA512

    8ee16cc60857b0a2687a35050e2f7d003d98f24a99ea4bd7b290842bfa2bc3b8e2bf184cf2e187c3a24e1cd003297d7710b8a1e406b16a5d066f2a944b8e4702

  • memory/1496-11-0x0000000000280000-0x0000000000289000-memory.dmp

    Filesize

    36KB

  • memory/1496-35-0x0000000000280000-0x0000000000289000-memory.dmp

    Filesize

    36KB

  • memory/1760-39-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/1760-43-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/1760-10-0x0000000000280000-0x0000000000289000-memory.dmp

    Filesize

    36KB

  • memory/1760-37-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/1760-38-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/1760-0-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/1760-40-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/1760-41-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/1760-42-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/1760-9-0x0000000000280000-0x0000000000289000-memory.dmp

    Filesize

    36KB

  • memory/1760-44-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/1760-45-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/1760-47-0x0000000000280000-0x0000000000289000-memory.dmp

    Filesize

    36KB

  • memory/1760-46-0x0000000000280000-0x0000000000289000-memory.dmp

    Filesize

    36KB

  • memory/1760-48-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/1760-49-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/1760-50-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB