Analysis

  • max time kernel
    30s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12/12/2024, 19:01

General

  • Target

    Start.bat

  • Size

    2KB

  • MD5

    6319006e2bfe88e5d7c643f6f44e25c8

  • SHA1

    3cc007c17d44a0d5292a4f397abe8990c19ed17e

  • SHA256

    b479648114f6ec339ff14483f813ef312d67fad1630a2c52f9b475717ee9f4c1

  • SHA512

    81ac3ca0fd198cb094156fb6f0d4b882d7ec676b201bf2b996fba095013d11c9de38de6c2442cca8f340aefc921db02e623502afa6f5038e3733337120b90fcd

Malware Config

Extracted

Family

bdaejec

C2

ddos.dnsnb8.net

Signatures

  • Bdaejec

    Bdaejec is a backdoor written in C++.

  • Bdaejec family
  • Detects Bdaejec Backdoor. 2 IoCs

    Bdaejec is backdoor written in C++.

  • Stops running service(s) 4 TTPs
  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Launches sc.exe 15 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Using powershell.exe command.

  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 31 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Start.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Windows\system32\sc.exe
      sc delete FairplayKD
      2⤵
      • Launches sc.exe
      PID:1692
    • C:\Windows\system32\sc.exe
      sc delete FairplayKD1
      2⤵
      • Launches sc.exe
      PID:1752
    • C:\Windows\system32\sc.exe
      sc delete FairplayKD2
      2⤵
      • Launches sc.exe
      PID:2356
    • C:\Windows\system32\sc.exe
      sc delete FairplayKD3
      2⤵
      • Launches sc.exe
      PID:2100
    • C:\Windows\system32\sc.exe
      sc delete FairplayKD4
      2⤵
      • Launches sc.exe
      PID:1956
    • C:\Windows\system32\sc.exe
      sc delete FairplayKD5
      2⤵
      • Launches sc.exe
      PID:2160
    • C:\Windows\system32\sc.exe
      sc delete FairplayKD6
      2⤵
      • Launches sc.exe
      PID:2328
    • C:\Windows\system32\sc.exe
      sc delete FairplayKD7
      2⤵
      • Launches sc.exe
      PID:1516
    • C:\Windows\system32\sc.exe
      sc delete FairplayKD8
      2⤵
      • Launches sc.exe
      PID:3012
    • C:\Windows\system32\sc.exe
      sc delete FairplayKD9
      2⤵
      • Launches sc.exe
      PID:1300
    • C:\Windows\system32\sc.exe
      sc delete FairplayKD10
      2⤵
      • Launches sc.exe
      PID:2696
    • C:\Windows\system32\PING.EXE
      ping 127.0.0.1 -n 2
      2⤵
      • System Network Configuration Discovery: Internet Connection Discovery
      • Runs ping.exe
      PID:1320
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -ExecutionPolicy Bypass -File C:\Users\service.ps1
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2836
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      PowerShell -Command "Get-EventLog -LogName * | ForEach { Clear-EventLog $_.Log }"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2828
    • C:\Users\Admin\AppData\Local\Temp\DutchbotInject.exe
      DutchbotInject.exe
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2724
      • C:\Users\Admin\AppData\Local\Temp\Ghxb.exe
        C:\Users\Admin\AppData\Local\Temp\Ghxb.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        PID:2308
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Local\Temp\614d3fd3.bat" "
          4⤵
          • System Location Discovery: System Language Discovery
          PID:236
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c sc stop FairplayKD >nul
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:272
        • C:\Windows\SysWOW64\sc.exe
          sc stop FairplayKD
          4⤵
          • Launches sc.exe
          • System Location Discovery: System Language Discovery
          PID:1496
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c sc delete FairplayKD >nul
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2592
        • C:\Windows\SysWOW64\sc.exe
          sc delete FairplayKD
          4⤵
          • Launches sc.exe
          • System Location Discovery: System Language Discovery
          PID:2352
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c sc stop FairplayKD1 >nul
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1648
        • C:\Windows\SysWOW64\sc.exe
          sc stop FairplayKD1
          4⤵
          • Launches sc.exe
          • System Location Discovery: System Language Discovery
          PID:1756
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c sc delete FairplayKD1 >nul
        3⤵
        • System Location Discovery: System Language Discovery
        PID:784
        • C:\Windows\SysWOW64\sc.exe
          sc delete FairplayKD1
          4⤵
          • Launches sc.exe
          • System Location Discovery: System Language Discovery
          PID:1488

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\614d3fd3.bat

    Filesize

    183B

    MD5

    ff142721f7da1f8be24e57202e57f02f

    SHA1

    b66d10975853a1c2c9b360f69a3761e6fe672a43

    SHA256

    3b33cf38de67cdb982aebfcb05a72f231a5bbe4d859f0c905b2a0514e844fb5b

    SHA512

    eb17e23e43d28bde2662f3ab6eb14a8ff2606a275dd1686c7c58f48d33b7023838d977713a1c31936ae372685e09da82dae4f03569203060c829ede14922d48d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    8c829444de99d0d69055231b2649bf92

    SHA1

    43023de9cc501c6516efb06f32b8e703a04e2c97

    SHA256

    c16e3ae647190a8b1415516943e258ab105f5db836fa82a4d3c3d0c36fca004c

    SHA512

    bdfab929fe8e16430eb98eb24bf9080144dee11373eca5855251835f13883672a2ea9a8af16bbaabd4c76c3e16080578e0a0869c8ff27aa8d85e05a398337f04

  • C:\Users\service.ps1

    Filesize

    1KB

    MD5

    55cee1bfb2bb685c8886fef55e2f0eed

    SHA1

    c52eab8b690bfc94ff354d10f3d944af76d49f9a

    SHA256

    728ecfc271c6117ff28b278845cd18614e79e69d4a8c9ee7d3266b274452ad95

    SHA512

    1ac4aa4ea02d513d66f39e0ebab8d64d6c03bdbb7ed84eff2fac6bebffb1bf0516e16f90baaf8c3d5a67b53c10b07518b3fbd37057b54966fcfd177a557ca02a

  • \Users\Admin\AppData\Local\Temp\Ghxb.exe

    Filesize

    15KB

    MD5

    56b2c3810dba2e939a8bb9fa36d3cf96

    SHA1

    99ee31cd4b0d6a4b62779da36e0eeecdd80589fc

    SHA256

    4354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07

    SHA512

    27812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e

  • memory/2308-39-0x0000000000DD0000-0x0000000000DD9000-memory.dmp

    Filesize

    36KB

  • memory/2308-29-0x0000000000DD0000-0x0000000000DD9000-memory.dmp

    Filesize

    36KB

  • memory/2724-20-0x0000000000DD0000-0x0000000000DD9000-memory.dmp

    Filesize

    36KB

  • memory/2724-16-0x0000000000EA0000-0x0000000000F02000-memory.dmp

    Filesize

    392KB

  • memory/2724-28-0x0000000000EA0000-0x0000000000F02000-memory.dmp

    Filesize

    392KB

  • memory/2828-15-0x00000000028E0000-0x00000000028E8000-memory.dmp

    Filesize

    32KB

  • memory/2828-14-0x000000001B6C0000-0x000000001B9A2000-memory.dmp

    Filesize

    2.9MB

  • memory/2836-5-0x00000000027F0000-0x0000000002870000-memory.dmp

    Filesize

    512KB

  • memory/2836-7-0x0000000002870000-0x0000000002878000-memory.dmp

    Filesize

    32KB

  • memory/2836-6-0x000000001B680000-0x000000001B962000-memory.dmp

    Filesize

    2.9MB