Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/12/2024, 16:37
Static task
static1
Behavioral task
behavioral1
Sample
be3531ac4bca4685147844c43584424b6efdd48b4ebf732659fda506f94e8bceN.exe
Resource
win7-20240903-en
General
-
Target
be3531ac4bca4685147844c43584424b6efdd48b4ebf732659fda506f94e8bceN.exe
-
Size
262KB
-
MD5
cb1ada827628b14def48055d43800ad0
-
SHA1
f31517f020c0bb0c97ba2238c1b88740cf01ff95
-
SHA256
be3531ac4bca4685147844c43584424b6efdd48b4ebf732659fda506f94e8bce
-
SHA512
e3dcd3da2d921a386fdf4222cad7decc3089c6a2af44ef7f14c5c782eb2cbcad318ffed6c760111a1ffe1fd30bfbed8e8e4274ee45fe0ba3dedca81f9d8457c4
-
SSDEEP
6144:v48g+ZmUUWC6kslF7tV51lDqUOXMJlAOsRLypwn0:v48SWC6ksl/laRLCwn
Malware Config
Extracted
bdaejec
ddos.dnsnb8.net
Signatures
-
Bdaejec family
-
Detects Bdaejec Backdoor. 2 IoCs
Bdaejec is backdoor written in C++.
resource yara_rule behavioral1/memory/3012-12-0x00000000011F0000-0x00000000011F9000-memory.dmp family_bdaejec_backdoor behavioral1/memory/3012-32-0x00000000011F0000-0x00000000011F9000-memory.dmp family_bdaejec_backdoor -
resource yara_rule behavioral1/files/0x000c000000012281-2.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 3012 vWeuJK.exe -
Loads dropped DLL 2 IoCs
pid Process 2372 be3531ac4bca4685147844c43584424b6efdd48b4ebf732659fda506f94e8bceN.exe 2372 be3531ac4bca4685147844c43584424b6efdd48b4ebf732659fda506f94e8bceN.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java.exe vWeuJK.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\FreeCell.exe vWeuJK.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONENOTE.EXE vWeuJK.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstatd.exe vWeuJK.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\unpack200.exe vWeuJK.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ssvagent.exe vWeuJK.exe File opened for modification C:\Program Files\Java\jre7\bin\orbd.exe vWeuJK.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe vWeuJK.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\Setup.exe vWeuJK.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{FC37790F-E395-416A-A1A1-53BC987E89B4}\chrome_installer.exe vWeuJK.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE vWeuJK.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe vWeuJK.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\policytool.exe vWeuJK.exe File opened for modification C:\Program Files\Java\jre7\bin\policytool.exe vWeuJK.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroBroker.exe vWeuJK.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\IEContentService.exe vWeuJK.exe File opened for modification C:\Program Files\Java\jre7\bin\tnameserv.exe vWeuJK.exe File opened for modification C:\Program Files\7-Zip\7zG.exe vWeuJK.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe vWeuJK.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstat.exe vWeuJK.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\keytool.exe vWeuJK.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\pack200.exe vWeuJK.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\orbd.exe vWeuJK.exe File opened for modification C:\Program Files\Java\jre7\bin\jp2launcher.exe vWeuJK.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\Hearts.exe vWeuJK.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\PurblePlace.exe vWeuJK.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jconsole.exe vWeuJK.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmap.exe vWeuJK.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\wsgen.exe vWeuJK.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe vWeuJK.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32Info.exe vWeuJK.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\reader_sl.exe vWeuJK.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\sidebar.exe vWeuJK.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\XLICONS.EXE vWeuJK.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javacpl.exe vWeuJK.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaws.exe vWeuJK.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\tnameserv.exe vWeuJK.exe File opened for modification C:\Program Files\Java\jre7\bin\java.exe vWeuJK.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\SpiderSolitaire.exe vWeuJK.exe File opened for modification C:\Program Files\Windows Photo Viewer\ImagingDevices.exe vWeuJK.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GRAPH.EXE vWeuJK.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javafxpackager.exe vWeuJK.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jinfo.exe vWeuJK.exe File opened for modification C:\Program Files\Java\jre7\bin\rmiregistry.exe vWeuJK.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe vWeuJK.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOUC.EXE vWeuJK.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javadoc.exe vWeuJK.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmc.exe vWeuJK.exe File opened for modification C:\Program Files\Java\jre7\bin\java-rmi.exe vWeuJK.exe File opened for modification C:\Program Files\Java\jre7\bin\unpack200.exe vWeuJK.exe File opened for modification C:\Program Files\Microsoft Office\Office14\MSOHTMED.EXE vWeuJK.exe File opened for modification C:\Program Files\Windows Mail\wab.exe vWeuJK.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe vWeuJK.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe vWeuJK.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jar.exe vWeuJK.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaw.exe vWeuJK.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe vWeuJK.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\A3DUtility.exe vWeuJK.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE vWeuJK.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\apt.exe vWeuJK.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jp2launcher.exe vWeuJK.exe File opened for modification C:\Program Files\Windows Sidebar\sidebar.exe vWeuJK.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe vWeuJK.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdate.exe vWeuJK.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language be3531ac4bca4685147844c43584424b6efdd48b4ebf732659fda506f94e8bceN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vWeuJK.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2372 wrote to memory of 3012 2372 be3531ac4bca4685147844c43584424b6efdd48b4ebf732659fda506f94e8bceN.exe 31 PID 2372 wrote to memory of 3012 2372 be3531ac4bca4685147844c43584424b6efdd48b4ebf732659fda506f94e8bceN.exe 31 PID 2372 wrote to memory of 3012 2372 be3531ac4bca4685147844c43584424b6efdd48b4ebf732659fda506f94e8bceN.exe 31 PID 2372 wrote to memory of 3012 2372 be3531ac4bca4685147844c43584424b6efdd48b4ebf732659fda506f94e8bceN.exe 31 PID 3012 wrote to memory of 2836 3012 vWeuJK.exe 33 PID 3012 wrote to memory of 2836 3012 vWeuJK.exe 33 PID 3012 wrote to memory of 2836 3012 vWeuJK.exe 33 PID 3012 wrote to memory of 2836 3012 vWeuJK.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\be3531ac4bca4685147844c43584424b6efdd48b4ebf732659fda506f94e8bceN.exe"C:\Users\Admin\AppData\Local\Temp\be3531ac4bca4685147844c43584424b6efdd48b4ebf732659fda506f94e8bceN.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\vWeuJK.exeC:\Users\Admin\AppData\Local\Temp\vWeuJK.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\033c47d2.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:2836
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
187B
MD59604a43e8202c57d88c6e855882405c4
SHA1a5c8d03a54a7c02ad642fe23235a1fd94969ab01
SHA25623642d419b70bf6c33869b4728f324b76d95802f0bc75782eb28408cf09d9101
SHA512f8a0f712f435c0fcb1dd16033c7269d840b5cfeb61c5f39d3cda4caf4150823f8acce384e661bc930026f797d632addc8df69ad53de97fe26962cc2131585b2e
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e