Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/12/2024, 19:24
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-04_e9fc2381cfd60a5353b73e6c394b5caf_avoslocker_luca-stealer_revil_wapomi.exe
Resource
win7-20240903-en
General
-
Target
2024-12-04_e9fc2381cfd60a5353b73e6c394b5caf_avoslocker_luca-stealer_revil_wapomi.exe
-
Size
12.1MB
-
MD5
e9fc2381cfd60a5353b73e6c394b5caf
-
SHA1
61c84c9282eb870315e40992b45c65d9936cf84f
-
SHA256
f11968df196f1c4fa3be918636fff4a8068c26e3a1fd72a51122ca23585659c9
-
SHA512
e0b5bed3093db2351bf9df49955f8a49584601d01d0393910d192584daec9a7d423c2df0580aa68d0b1e4aa32e627024bd1fab3722a47b8f120b40acdb2a7cee
-
SSDEEP
196608:KqqKNdE37uPvvyqOnkhJsv6tWKFdu9Cie9GJ:KqqKNIC3bOSJsv6tWKFdu9Cdy
Malware Config
Extracted
bdaejec
ddos.dnsnb8.net
Signatures
-
Bdaejec family
-
Detects Bdaejec Backdoor. 2 IoCs
Bdaejec is backdoor written in C++.
resource yara_rule behavioral1/memory/1448-11-0x0000000000B70000-0x0000000000B79000-memory.dmp family_bdaejec_backdoor behavioral1/memory/1448-17-0x0000000000B70000-0x0000000000B79000-memory.dmp family_bdaejec_backdoor -
resource yara_rule behavioral1/files/0x00090000000122ea-7.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 1448 BoVjvr.exe -
Loads dropped DLL 2 IoCs
pid Process 2492 2024-12-04_e9fc2381cfd60a5353b73e6c394b5caf_avoslocker_luca-stealer_revil_wapomi.exe 2492 2024-12-04_e9fc2381cfd60a5353b73e6c394b5caf_avoslocker_luca-stealer_revil_wapomi.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\schemagen.exe BoVjvr.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ktab.exe BoVjvr.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\reader_sl.exe BoVjvr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GROOVEMN.EXE BoVjvr.exe File opened for modification C:\Program Files\Java\jre7\bin\jabswitch.exe BoVjvr.exe File opened for modification C:\Program Files\Java\jre7\bin\kinit.exe BoVjvr.exe File opened for modification C:\Program Files\Java\jre7\bin\ktab.exe BoVjvr.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe BoVjvr.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\extcheck.exe BoVjvr.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\idlj.exe BoVjvr.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jhat.exe BoVjvr.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmiregistry.exe BoVjvr.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\A3DUtility.exe BoVjvr.exe File opened for modification C:\Program Files\7-Zip\7z.exe BoVjvr.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Eula.exe BoVjvr.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateOnDemand.exe BoVjvr.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\Solitaire.exe BoVjvr.exe File opened for modification C:\Program Files\Windows Sidebar\sidebar.exe BoVjvr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CNFNOT32.EXE BoVjvr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\misc.exe BoVjvr.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jdb.exe BoVjvr.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\wsgen.exe BoVjvr.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\orbd.exe BoVjvr.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\rmid.exe BoVjvr.exe File opened for modification C:\Program Files\Java\jre7\bin\javaws.exe BoVjvr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE BoVjvr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\INFOPATH.EXE BoVjvr.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe BoVjvr.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javap.exe BoVjvr.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jrunscript.exe BoVjvr.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\native2ascii.exe BoVjvr.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\xjc.exe BoVjvr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOSYNC.EXE BoVjvr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SCANPST.EXE BoVjvr.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmic.exe BoVjvr.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\FreeCell.exe BoVjvr.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler.exe BoVjvr.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateBroker.exe BoVjvr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\IEContentService.exe BoVjvr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\WORDICON.EXE BoVjvr.exe File opened for modification C:\Program Files\7-Zip\7zG.exe BoVjvr.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\servertool.exe BoVjvr.exe File opened for modification C:\Program Files\Java\jre7\bin\javacpl.exe BoVjvr.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe BoVjvr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GRAPH.EXE BoVjvr.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jcmd.exe BoVjvr.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaws.exe BoVjvr.exe File opened for modification C:\Program Files\Java\jre7\bin\ssvagent.exe BoVjvr.exe File opened for modification C:\Program Files\Windows Mail\WinMail.exe BoVjvr.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jarsigner.exe BoVjvr.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\kinit.exe BoVjvr.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\helper.exe BoVjvr.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSTORE.EXE BoVjvr.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jinfo.exe BoVjvr.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe BoVjvr.exe File opened for modification C:\Program Files\DVD Maker\DVDMaker.exe BoVjvr.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe BoVjvr.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javah.exe BoVjvr.exe File opened for modification C:\Program Files\Microsoft Games\Chess\Chess.exe BoVjvr.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe BoVjvr.exe File opened for modification C:\Program Files\Windows Mail\wab.exe BoVjvr.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32Info.exe BoVjvr.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javac.exe BoVjvr.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaws.exe BoVjvr.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2236 2492 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-12-04_e9fc2381cfd60a5353b73e6c394b5caf_avoslocker_luca-stealer_revil_wapomi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BoVjvr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2492 2024-12-04_e9fc2381cfd60a5353b73e6c394b5caf_avoslocker_luca-stealer_revil_wapomi.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2492 2024-12-04_e9fc2381cfd60a5353b73e6c394b5caf_avoslocker_luca-stealer_revil_wapomi.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2492 wrote to memory of 1448 2492 2024-12-04_e9fc2381cfd60a5353b73e6c394b5caf_avoslocker_luca-stealer_revil_wapomi.exe 31 PID 2492 wrote to memory of 1448 2492 2024-12-04_e9fc2381cfd60a5353b73e6c394b5caf_avoslocker_luca-stealer_revil_wapomi.exe 31 PID 2492 wrote to memory of 1448 2492 2024-12-04_e9fc2381cfd60a5353b73e6c394b5caf_avoslocker_luca-stealer_revil_wapomi.exe 31 PID 2492 wrote to memory of 1448 2492 2024-12-04_e9fc2381cfd60a5353b73e6c394b5caf_avoslocker_luca-stealer_revil_wapomi.exe 31 PID 2492 wrote to memory of 2236 2492 2024-12-04_e9fc2381cfd60a5353b73e6c394b5caf_avoslocker_luca-stealer_revil_wapomi.exe 32 PID 2492 wrote to memory of 2236 2492 2024-12-04_e9fc2381cfd60a5353b73e6c394b5caf_avoslocker_luca-stealer_revil_wapomi.exe 32 PID 2492 wrote to memory of 2236 2492 2024-12-04_e9fc2381cfd60a5353b73e6c394b5caf_avoslocker_luca-stealer_revil_wapomi.exe 32 PID 2492 wrote to memory of 2236 2492 2024-12-04_e9fc2381cfd60a5353b73e6c394b5caf_avoslocker_luca-stealer_revil_wapomi.exe 32 PID 1448 wrote to memory of 2528 1448 BoVjvr.exe 34 PID 1448 wrote to memory of 2528 1448 BoVjvr.exe 34 PID 1448 wrote to memory of 2528 1448 BoVjvr.exe 34 PID 1448 wrote to memory of 2528 1448 BoVjvr.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-12-04_e9fc2381cfd60a5353b73e6c394b5caf_avoslocker_luca-stealer_revil_wapomi.exe"C:\Users\Admin\AppData\Local\Temp\2024-12-04_e9fc2381cfd60a5353b73e6c394b5caf_avoslocker_luca-stealer_revil_wapomi.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\BoVjvr.exeC:\Users\Admin\AppData\Local\Temp\BoVjvr.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\30ee54fd.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:2528
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2492 -s 2122⤵
- Program crash
PID:2236
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
187B
MD54e4f2df626a4c7934deae0427718af55
SHA186ad0203efc702a1e1ea96d2fdcc68df23c2fc6d
SHA2569d63e0069145da23d4215da61e723fcf013e44b09888da2256fac1e6b50801d5
SHA512eeed13668f9eb9d7f5a33da1ed355afaf3571c7102b57bc6ac8740d827cbcf09a4688ee246095d76f23e441081035fe874f288026bd9915492e3a885b56f0007
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e