Analysis
-
max time kernel
13s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
03-11-2024 08:26
Static task
static1
Behavioral task
behavioral1
Sample
b5bbd08a0f090cf1439377dcef7f7c7e2c01b1ba785b25ecef921409eed52eacN.exe
Resource
win7-20241010-en
General
-
Target
b5bbd08a0f090cf1439377dcef7f7c7e2c01b1ba785b25ecef921409eed52eacN.exe
-
Size
19KB
-
MD5
a34c77d7eaaf8c46da965d1a7496ddc0
-
SHA1
913e42d7abc2dc246f851d178f5681ed3293579b
-
SHA256
b5bbd08a0f090cf1439377dcef7f7c7e2c01b1ba785b25ecef921409eed52eac
-
SHA512
500d49091bb2e3907ea541f86ead7a2694d7a7fe99b3986a75154de2b07312a6591a23bbf84c43388bf2c26c3f3bab18049a1966e91764c4395fa32f07ed7500
-
SSDEEP
384:1FOS2XZQaD7U8iu4YsAa7ZA0UvH2lsRv21yW7GbAxur6+Y9PffPz:PSQGPL4vzZq2o9W7GsxBbPr
Malware Config
Extracted
bdaejec
ddos.dnsnb8.net
Signatures
-
Bdaejec family
-
Detects Bdaejec Backdoor. 1 IoCs
Bdaejec is backdoor written in C++.
Processes:
resource yara_rule behavioral1/memory/2448-54-0x0000000000C60000-0x0000000000C69000-memory.dmp family_bdaejec_backdoor -
Processes:
resource yara_rule behavioral1/files/0x00070000000120fc-2.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
Processes:
wnrlUZ.exepid Process 2448 wnrlUZ.exe -
Loads dropped DLL 2 IoCs
Processes:
b5bbd08a0f090cf1439377dcef7f7c7e2c01b1ba785b25ecef921409eed52eacN.exepid Process 2244 b5bbd08a0f090cf1439377dcef7f7c7e2c01b1ba785b25ecef921409eed52eacN.exe 2244 b5bbd08a0f090cf1439377dcef7f7c7e2c01b1ba785b25ecef921409eed52eacN.exe -
Drops file in Program Files directory 64 IoCs
Processes:
wnrlUZ.exedescription ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GRAPH.EXE wnrlUZ.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaws.exe wnrlUZ.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\policytool.exe wnrlUZ.exe File opened for modification C:\Program Files\Java\jre7\bin\javaws.exe wnrlUZ.exe File opened for modification C:\Program Files\Java\jre7\bin\klist.exe wnrlUZ.exe File opened for modification C:\Program Files\Java\jre7\bin\rmiregistry.exe wnrlUZ.exe File opened for modification C:\Program Files\SyncGet.exe wnrlUZ.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\Setup.exe wnrlUZ.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSQRY32.EXE wnrlUZ.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SETLANG.EXE wnrlUZ.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\policytool.exe wnrlUZ.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\unpack200.exe wnrlUZ.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AdobeCollabSync.exe wnrlUZ.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\106.0.5249.119\chrome_installer.exe wnrlUZ.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SCANPST.EXE wnrlUZ.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe wnrlUZ.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe wnrlUZ.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jarsigner.exe wnrlUZ.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\SpiderSolitaire.exe wnrlUZ.exe File opened for modification C:\Program Files\Windows Defender\MSASCui.exe wnrlUZ.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\misc.exe wnrlUZ.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroBroker.exe wnrlUZ.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaws.exe wnrlUZ.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmid.exe wnrlUZ.exe File opened for modification C:\Program Files\Java\jre7\bin\jabswitch.exe wnrlUZ.exe File opened for modification C:\Program Files\Java\jre7\bin\policytool.exe wnrlUZ.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe wnrlUZ.exe File opened for modification C:\Program Files\Mozilla Firefox\private_browsing.exe wnrlUZ.exe File opened for modification C:\Program Files\Windows Journal\PDIALOG.exe wnrlUZ.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSTORE.EXE wnrlUZ.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\apt.exe wnrlUZ.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec64.exe wnrlUZ.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdate.exe wnrlUZ.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CNFNOT32.EXE wnrlUZ.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSTORDB.EXE wnrlUZ.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PPTICO.EXE wnrlUZ.exe File opened for modification C:\Program Files (x86)\Windows Mail\wabmig.exe wnrlUZ.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jabswitch.exe wnrlUZ.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jar.exe wnrlUZ.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\schemagen.exe wnrlUZ.exe File opened for modification C:\Program Files\Java\jre7\bin\orbd.exe wnrlUZ.exe File opened for modification C:\Program Files\Java\jre7\bin\unpack200.exe wnrlUZ.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe wnrlUZ.exe File opened for modification C:\Program Files\Windows Mail\WinMail.exe wnrlUZ.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OIS.EXE wnrlUZ.exe File opened for modification C:\Program Files\7-Zip\7zG.exe wnrlUZ.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstatd.exe wnrlUZ.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmic.exe wnrlUZ.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\serialver.exe wnrlUZ.exe File opened for modification C:\Program Files\Java\jre7\bin\servertool.exe wnrlUZ.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\Hearts.exe wnrlUZ.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe wnrlUZ.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONENOTEM.EXE wnrlUZ.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\XLICONS.EXE wnrlUZ.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javac.exe wnrlUZ.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\unpack200.exe wnrlUZ.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ktab.exe wnrlUZ.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\rmid.exe wnrlUZ.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\tnameserv.exe wnrlUZ.exe File opened for modification C:\Program Files\Java\jre7\bin\javacpl.exe wnrlUZ.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroTextExtractor.exe wnrlUZ.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\servertool.exe wnrlUZ.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java.exe wnrlUZ.exe File opened for modification C:\Program Files\Java\jre7\bin\javaw.exe wnrlUZ.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 2380 2244 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
wnrlUZ.execmd.exeb5bbd08a0f090cf1439377dcef7f7c7e2c01b1ba785b25ecef921409eed52eacN.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnrlUZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b5bbd08a0f090cf1439377dcef7f7c7e2c01b1ba785b25ecef921409eed52eacN.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
b5bbd08a0f090cf1439377dcef7f7c7e2c01b1ba785b25ecef921409eed52eacN.exewnrlUZ.exedescription pid Process procid_target PID 2244 wrote to memory of 2448 2244 b5bbd08a0f090cf1439377dcef7f7c7e2c01b1ba785b25ecef921409eed52eacN.exe 30 PID 2244 wrote to memory of 2448 2244 b5bbd08a0f090cf1439377dcef7f7c7e2c01b1ba785b25ecef921409eed52eacN.exe 30 PID 2244 wrote to memory of 2448 2244 b5bbd08a0f090cf1439377dcef7f7c7e2c01b1ba785b25ecef921409eed52eacN.exe 30 PID 2244 wrote to memory of 2448 2244 b5bbd08a0f090cf1439377dcef7f7c7e2c01b1ba785b25ecef921409eed52eacN.exe 30 PID 2448 wrote to memory of 2612 2448 wnrlUZ.exe 32 PID 2448 wrote to memory of 2612 2448 wnrlUZ.exe 32 PID 2448 wrote to memory of 2612 2448 wnrlUZ.exe 32 PID 2448 wrote to memory of 2612 2448 wnrlUZ.exe 32 PID 2244 wrote to memory of 2380 2244 b5bbd08a0f090cf1439377dcef7f7c7e2c01b1ba785b25ecef921409eed52eacN.exe 34 PID 2244 wrote to memory of 2380 2244 b5bbd08a0f090cf1439377dcef7f7c7e2c01b1ba785b25ecef921409eed52eacN.exe 34 PID 2244 wrote to memory of 2380 2244 b5bbd08a0f090cf1439377dcef7f7c7e2c01b1ba785b25ecef921409eed52eacN.exe 34 PID 2244 wrote to memory of 2380 2244 b5bbd08a0f090cf1439377dcef7f7c7e2c01b1ba785b25ecef921409eed52eacN.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\b5bbd08a0f090cf1439377dcef7f7c7e2c01b1ba785b25ecef921409eed52eacN.exe"C:\Users\Admin\AppData\Local\Temp\b5bbd08a0f090cf1439377dcef7f7c7e2c01b1ba785b25ecef921409eed52eacN.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\wnrlUZ.exeC:\Users\Admin\AppData\Local\Temp\wnrlUZ.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\7ab9168a.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:2612
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2244 -s 2082⤵
- Program crash
PID:2380
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4B
MD520879c987e2f9a916e578386d499f629
SHA1c7b33ddcc42361fdb847036fc07e880b81935d5d
SHA2569f2981a7cc4d40a2a409dc895de64253acd819d7c0011c8e80b86fe899464e31
SHA512bcdde1625364dd6dd143b45bdcec8d59cf8982aff33790d390b839f3869e0e815684568b14b555a596d616252aeeaa98dac2e6e551c9095ea11a575ff25ff84f
-
Filesize
187B
MD5ce428c3a5f330c27f592de26e9777088
SHA15c2907677ed89627f9da65cfaaca7b4a287bc457
SHA256a2341e5273fa7fa3590009924c86a23bd09d5e9c2d993405b822e593e238cf26
SHA512b007c1d3a070f09b494961190435c49b69ab9cd53b74515da3d5cc7a9749f7981be45052f908d970e5b466cff3a252124dcd752e226036df107da561ad83821b
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e