Analysis
-
max time kernel
141s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 00:23
Behavioral task
behavioral1
Sample
2024-12-22_6970b4657293e4980e51dc756dd1bad3_smoke-loader_wapomi.exe
Resource
win7-20240903-en
General
-
Target
2024-12-22_6970b4657293e4980e51dc756dd1bad3_smoke-loader_wapomi.exe
-
Size
54KB
-
MD5
6970b4657293e4980e51dc756dd1bad3
-
SHA1
42cf3bad1f8079c0ceabe7addc45e031ae129f39
-
SHA256
acd1aa0d197f7eef419d12b309b3a5cdfc094bf300c2f7fc84523ea7e49219c1
-
SHA512
4c739e30f4d12896dde1ff4f23d70dfd5120b0e77e4a59adce1b36540b0a86065315a383dd76ac7680bf0a17019a3518df70cafc17a8b2edb2b8d1d0f9259390
-
SSDEEP
768:1ubLj/ur3kdABSJpYkI1+RjBHUZWG4F9UIV2SyYAxIQGPL4vzZq2o9W7GsxBbPr:1AekdABcfjBHCje9UBS5AxDGCq2iW7z
Malware Config
Extracted
bdaejec
ddos.dnsnb8.net
Signatures
-
Bdaejec family
-
Detects Bdaejec Backdoor. 1 IoCs
Bdaejec is backdoor written in C++.
resource yara_rule behavioral1/memory/2312-24-0x0000000000D40000-0x0000000000D49000-memory.dmp family_bdaejec_backdoor -
Detected Nirsoft tools 1 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral1/memory/1696-26-0x0000000000400000-0x000000000041E000-memory.dmp Nirsoft -
resource yara_rule behavioral1/files/0x00080000000120f9-4.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 2312 WHaujX.exe -
Loads dropped DLL 2 IoCs
pid Process 1696 2024-12-22_6970b4657293e4980e51dc756dd1bad3_smoke-loader_wapomi.exe 1696 2024-12-22_6970b4657293e4980e51dc756dd1bad3_smoke-loader_wapomi.exe -
resource yara_rule behavioral1/memory/1696-0-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/1696-26-0x0000000000400000-0x000000000041E000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Games\Mahjong\Mahjong.exe WHaujX.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\Setup.exe WHaujX.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE WHaujX.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\sidebar.exe WHaujX.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\keytool.exe WHaujX.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jar.exe WHaujX.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmap.exe WHaujX.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstatd.exe WHaujX.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmid.exe WHaujX.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ssvagent.exe WHaujX.exe File opened for modification C:\Program Files\Java\jre7\bin\java-rmi.exe WHaujX.exe File opened for modification C:\Program Files\Java\jre7\bin\kinit.exe WHaujX.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe WHaujX.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CLVIEW.EXE WHaujX.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\WORDICON.EXE WHaujX.exe File opened for modification C:\Program Files (x86)\Windows Mail\wabmig.exe WHaujX.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe WHaujX.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jdb.exe WHaujX.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstack.exe WHaujX.exe File opened for modification C:\Program Files\Java\jre7\bin\keytool.exe WHaujX.exe File opened for modification C:\Program Files\Windows Mail\WinMail.exe WHaujX.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\ONELEV.EXE WHaujX.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe WHaujX.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jinfo.exe WHaujX.exe File opened for modification C:\Program Files\Java\jre7\bin\java.exe WHaujX.exe File opened for modification C:\Program Files\Java\jre7\bin\klist.exe WHaujX.exe File opened for modification C:\Program Files\Java\jre7\bin\orbd.exe WHaujX.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\Solitaire.exe WHaujX.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe WHaujX.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\reader_sl.exe WHaujX.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javadoc.exe WHaujX.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\IEContentService.exe WHaujX.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SCANPST.EXE WHaujX.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE WHaujX.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java-rmi.exe WHaujX.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec.exe WHaujX.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\FreeCell.exe WHaujX.exe File opened for modification C:\Program Files\Mozilla Firefox\default-browser-agent.exe WHaujX.exe File opened for modification C:\Program Files\Windows Mail\wabmig.exe WHaujX.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler.exe WHaujX.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\106.0.5249.119\chrome_installer.exe WHaujX.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jarsigner.exe WHaujX.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaw.exe WHaujX.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\tnameserv.exe WHaujX.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe WHaujX.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE WHaujX.exe File opened for modification C:\Program Files\7-Zip\7zG.exe WHaujX.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\unpack200.exe WHaujX.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\Hearts.exe WHaujX.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONENOTEM.EXE WHaujX.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\wsimport.exe WHaujX.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe WHaujX.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\excelcnv.exe WHaujX.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\klist.exe WHaujX.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\xjc.exe WHaujX.exe File opened for modification C:\Program Files\Java\jre7\bin\unpack200.exe WHaujX.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\chkrzm.exe WHaujX.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\klist.exe WHaujX.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe WHaujX.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\appletviewer.exe WHaujX.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\apt.exe WHaujX.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javah.exe WHaujX.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\kinit.exe WHaujX.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\policytool.exe WHaujX.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-12-22_6970b4657293e4980e51dc756dd1bad3_smoke-loader_wapomi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WHaujX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1696 wrote to memory of 2312 1696 2024-12-22_6970b4657293e4980e51dc756dd1bad3_smoke-loader_wapomi.exe 30 PID 1696 wrote to memory of 2312 1696 2024-12-22_6970b4657293e4980e51dc756dd1bad3_smoke-loader_wapomi.exe 30 PID 1696 wrote to memory of 2312 1696 2024-12-22_6970b4657293e4980e51dc756dd1bad3_smoke-loader_wapomi.exe 30 PID 1696 wrote to memory of 2312 1696 2024-12-22_6970b4657293e4980e51dc756dd1bad3_smoke-loader_wapomi.exe 30 PID 2312 wrote to memory of 2752 2312 WHaujX.exe 32 PID 2312 wrote to memory of 2752 2312 WHaujX.exe 32 PID 2312 wrote to memory of 2752 2312 WHaujX.exe 32 PID 2312 wrote to memory of 2752 2312 WHaujX.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-12-22_6970b4657293e4980e51dc756dd1bad3_smoke-loader_wapomi.exe"C:\Users\Admin\AppData\Local\Temp\2024-12-22_6970b4657293e4980e51dc756dd1bad3_smoke-loader_wapomi.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\WHaujX.exeC:\Users\Admin\AppData\Local\Temp\WHaujX.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\3cd24afc.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:2752
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
187B
MD5f4e77edcf58cbe7da7e6121c83dd55dc
SHA1807e8151d10c6baa7b104a9832826a7092417e9c
SHA256e797d61b953ded1ea28cb6bc8e67be83c22c2dcf80cdfb6cc675f673e9cc77c4
SHA5129aace64b389ccfd46a577985d2f14964d010a1627896c25a12ce8b08bcaa8a8ae717eefd33118f5ef92ee5c3d3aae0b4598b20a3d012497a7c1b882702320d0a
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e