Analysis
-
max time kernel
130s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2024 04:24
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-28_b1a6d73d47efe38e76db39cb6262be7b_smoke-loader_wapomi.exe
Resource
win7-20240903-en
General
-
Target
2024-11-28_b1a6d73d47efe38e76db39cb6262be7b_smoke-loader_wapomi.exe
-
Size
80KB
-
MD5
b1a6d73d47efe38e76db39cb6262be7b
-
SHA1
c4ea3227ebb71c82f62b110e7bb197ef0754cbdd
-
SHA256
fbc68b9c25a028a5368c1ae584d5f2197e6c1e88817b02c56ed45a7fdca06be4
-
SHA512
dce27cd077977636ddba0f165fb075273a3bf210d09e20843d3655e4ee8f1c0f8866053c639040cb535adef4735e114b59519db93ab8b9f43ad102abd91ac74a
-
SSDEEP
1536:RfnLq01weW5yX3jFxv49Nu4GhQBJGCq2iW7z:Y3ysTGhQbGCH
Malware Config
Extracted
bdaejec
ddos.dnsnb8.net
Signatures
-
Bdaejec family
-
Detects Bdaejec Backdoor. 1 IoCs
Bdaejec is backdoor written in C++.
Processes:
resource yara_rule behavioral2/memory/3544-8-0x0000000000DB0000-0x0000000000DB9000-memory.dmp family_bdaejec_backdoor -
Processes:
resource yara_rule behavioral2/files/0x0008000000023c5f-3.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
lFZi.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation lFZi.exe -
Executes dropped EXE 1 IoCs
Processes:
lFZi.exepid Process 3544 lFZi.exe -
Drops file in Program Files directory 64 IoCs
Processes:
lFZi.exedescription ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.NetFX40.exe lFZi.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\chrmstp.exe lFZi.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe lFZi.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SDXHelperBgt.exe lFZi.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.StorePurchaseApp_11811.1001.18.0_x64__8wekyb3d8bbwe\StoreExperienceHost.exe lFZi.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\arh.exe lFZi.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jar.exe lFZi.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\serialver.exe lFZi.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jp2launcher.exe lFZi.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\SQLDumper.exe lFZi.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\PaintStudio.View.exe lFZi.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\HxAccounts.exe lFZi.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\policytool.exe lFZi.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\ScreenSketch.exe lFZi.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ktab.exe lFZi.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_x64__8wekyb3d8bbwe\PeopleApp.exe lFZi.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\AcroLayoutRecognizer.exe lFZi.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstatd.exe lFZi.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\ktab.exe lFZi.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\unpack200.exe lFZi.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.Loader.exe lFZi.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msotd.exe lFZi.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\codecpacks.webp.exe lFZi.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\idlj.exe lFZi.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\pack200.exe lFZi.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DWTRIG20.EXE lFZi.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Common.DBConnection.exe lFZi.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\filecompare.exe lFZi.exe File opened for modification C:\Program Files\dotnet\dotnet.exe lFZi.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\createdump.exe lFZi.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jarsigner.exe lFZi.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javapackager.exe lFZi.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Video.UI.exe lFZi.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\klist.exe lFZi.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\pack200.exe lFZi.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\Addons\OneDriveSetup.exe lFZi.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_x64__8wekyb3d8bbwe\Microsoft.WebMediaExtensions.exe lFZi.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\rmiregistry.exe lFZi.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOSREC.EXE lFZi.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOXMLED.EXE lFZi.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java.exe lFZi.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\policytool.exe lFZi.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\WORDICON.EXE lFZi.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\WhatsNew.Store.exe lFZi.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\MixedRealityPortal.Brokered.exe lFZi.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\XboxApp.exe lFZi.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGamingOverlay_2.34.28001.0_x64__8wekyb3d8bbwe\GameBar.exe lFZi.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\klist.exe lFZi.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\orbd.exe lFZi.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\pack200.exe lFZi.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.NetFX45.exe lFZi.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeBridge\SkypeBridge.exe lFZi.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Wallet_2.4.18324.0_x64__8wekyb3d8bbwe\Microsoft.Wallet.exe lFZi.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\xjc.exe lFZi.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\protocolhandler.exe lFZi.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\VPREVIEW.EXE lFZi.exe File opened for modification C:\Program Files\Windows Security\BrowserCore\BrowserCore.exe lFZi.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\servertool.exe lFZi.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Common.DBConnection64.exe lFZi.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\SPREADSHEETCOMPARE.EXE lFZi.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\reader_sl.exe lFZi.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jjs.exe lFZi.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoasb.exe lFZi.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoia.exe lFZi.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
2024-11-28_b1a6d73d47efe38e76db39cb6262be7b_smoke-loader_wapomi.exelFZi.execmd.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-28_b1a6d73d47efe38e76db39cb6262be7b_smoke-loader_wapomi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lFZi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
2024-11-28_b1a6d73d47efe38e76db39cb6262be7b_smoke-loader_wapomi.exelFZi.exedescription pid Process procid_target PID 1384 wrote to memory of 3544 1384 2024-11-28_b1a6d73d47efe38e76db39cb6262be7b_smoke-loader_wapomi.exe 85 PID 1384 wrote to memory of 3544 1384 2024-11-28_b1a6d73d47efe38e76db39cb6262be7b_smoke-loader_wapomi.exe 85 PID 1384 wrote to memory of 3544 1384 2024-11-28_b1a6d73d47efe38e76db39cb6262be7b_smoke-loader_wapomi.exe 85 PID 3544 wrote to memory of 1444 3544 lFZi.exe 103 PID 3544 wrote to memory of 1444 3544 lFZi.exe 103 PID 3544 wrote to memory of 1444 3544 lFZi.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-11-28_b1a6d73d47efe38e76db39cb6262be7b_smoke-loader_wapomi.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-28_b1a6d73d47efe38e76db39cb6262be7b_smoke-loader_wapomi.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\lFZi.exeC:\Users\Admin\AppData\Local\Temp\lFZi.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\2b3d44b5.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:1444
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
183B
MD573b2f57f72c7811133304fe87ce179ec
SHA15f8c1dae5047763ee3c38a1ec4ab3aac68f7f4f4
SHA256ebda9f6233179466956a592b881910cd9b72c8e8a0b76d048875e50851b7da38
SHA5121339fcd89ad36b95e9b7a9c4910e26fab27eae00df0eed5ca1eb958ba15c10fbbb4eef0edbd7fa54bf1e5f341288c330d27835de6c60481baa1872cf2de6f501
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e