Analysis

  • max time kernel
    137s
  • max time network
    100s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    25-12-2024 22:44

General

  • Target

    9ab461885cb0db4858d451e611af70927e268aa79fa0f89709800046a3692406.exe

  • Size

    12.0MB

  • MD5

    b4662dedfb949f59b490a3bf4eec958b

  • SHA1

    a2a0a0c9e33a668cc2afcd4c1c7832f68af066c1

  • SHA256

    9ab461885cb0db4858d451e611af70927e268aa79fa0f89709800046a3692406

  • SHA512

    797aeff4c1bab31aa3d7b6b705598307b87fba3835ceb28992a8735aa97b6c2f495ec7260dde05414ab7ae87517c9f641c41f4a715cf0ede3dee9847d7bb7d6d

  • SSDEEP

    49152:s/KE1ld3/wAyJxVZp2bnbJ5eA+zbFTCTMqQ:s/KU9/pyJx9Y5el30T

Malware Config

Extracted

Family

bdaejec

C2

ddos.dnsnb8.net

Signatures

  • Bdaejec

    Bdaejec is a backdoor written in C++.

  • Bdaejec family
  • Detects Bdaejec Backdoor. 2 IoCs

    Bdaejec is backdoor written in C++.

  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 9 IoCs
  • Suspicious use of SendNotifyMessage 8 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9ab461885cb0db4858d451e611af70927e268aa79fa0f89709800046a3692406.exe
    "C:\Users\Admin\AppData\Local\Temp\9ab461885cb0db4858d451e611af70927e268aa79fa0f89709800046a3692406.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:576
    • C:\Users\Admin\AppData\Local\Temp\NpJqsY.exe
      C:\Users\Admin\AppData\Local\Temp\NpJqsY.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2988
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\55842bbd.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3028
  • C:\Program Files\VideoLAN\VLC\vlc.exe
    "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\ProtectFind.wmv"
    1⤵
    • Executes dropped EXE
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:3040

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\55842bbd.bat

    Filesize

    187B

    MD5

    a302836b8d068a5d0fad5233d2b75653

    SHA1

    b442e8049655a9c481f8487826c0643ea888908d

    SHA256

    f0da6d91171518560bfe16e4adb84f223a2184d89add94fcf1369d8fceaf04ae

    SHA512

    5d60a6c476e1f10d234e6320d6cf78cded98e5f7e234b2507a7dd603e3212e568a6908409d9f28ea84ea5b406380231078725334c4f2f698534a7123b5a11f20

  • C:\Users\Admin\AppData\Local\Temp\NpJqsY.exe

    Filesize

    15KB

    MD5

    56b2c3810dba2e939a8bb9fa36d3cf96

    SHA1

    99ee31cd4b0d6a4b62779da36e0eeecdd80589fc

    SHA256

    4354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07

    SHA512

    27812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e

  • \Program Files\VideoLAN\VLC\vlc.exe

    Filesize

    966KB

    MD5

    3740507a1dc4ff4cb5c6e52652c10c20

    SHA1

    b2c8a0a736fe81c101f4ab4cd6be8099c3f902b3

    SHA256

    6a72cc8649a63b017844c4c1f3885a250d1a982ffe5f1e58b6f1432fe9198e62

    SHA512

    d5299859a6121c6ae5813be61648ca1f005970ebe34a8217d05b570ffbd4651f64ad7b3a7bf5129e708e07b36e097333f754b213e73d5fe9246347afd8fa3c22

  • memory/576-8-0x0000000000330000-0x0000000000F91000-memory.dmp

    Filesize

    12.4MB

  • memory/576-12-0x0000000000080000-0x0000000000089000-memory.dmp

    Filesize

    36KB

  • memory/576-10-0x0000000000080000-0x0000000000089000-memory.dmp

    Filesize

    36KB

  • memory/576-15-0x0000000001320000-0x0000000001420000-memory.dmp

    Filesize

    1024KB

  • memory/576-17-0x0000000000330000-0x0000000000F91000-memory.dmp

    Filesize

    12.4MB

  • memory/576-19-0x0000000001320000-0x0000000001420000-memory.dmp

    Filesize

    1024KB

  • memory/576-25-0x0000000000330000-0x0000000000F91000-memory.dmp

    Filesize

    12.4MB

  • memory/2988-11-0x0000000000F30000-0x0000000000F39000-memory.dmp

    Filesize

    36KB

  • memory/2988-18-0x0000000000F30000-0x0000000000F39000-memory.dmp

    Filesize

    36KB

  • memory/3040-35-0x000007FEFBAD0000-0x000007FEFBB04000-memory.dmp

    Filesize

    208KB

  • memory/3040-34-0x000000013F510000-0x000000013F608000-memory.dmp

    Filesize

    992KB

  • memory/3040-37-0x000007FEFBDD0000-0x000007FEFBDE8000-memory.dmp

    Filesize

    96KB

  • memory/3040-38-0x000007FEFBAB0000-0x000007FEFBAC7000-memory.dmp

    Filesize

    92KB

  • memory/3040-36-0x000007FEF7E90000-0x000007FEF8146000-memory.dmp

    Filesize

    2.7MB

  • memory/3040-39-0x000007FEFBA90000-0x000007FEFBAA1000-memory.dmp

    Filesize

    68KB

  • memory/3040-40-0x000007FEFBA70000-0x000007FEFBA87000-memory.dmp

    Filesize

    92KB

  • memory/3040-41-0x000007FEFBA50000-0x000007FEFBA61000-memory.dmp

    Filesize

    68KB

  • memory/3040-42-0x000007FEFBA30000-0x000007FEFBA4D000-memory.dmp

    Filesize

    116KB

  • memory/3040-44-0x000007FEFB990000-0x000007FEFB9A1000-memory.dmp

    Filesize

    68KB

  • memory/3040-45-0x000007FEFB940000-0x000007FEFB981000-memory.dmp

    Filesize

    260KB

  • memory/3040-43-0x000007FEF6FB0000-0x000007FEF71BB000-memory.dmp

    Filesize

    2.0MB

  • memory/3040-46-0x000007FEFB8E0000-0x000007FEFB901000-memory.dmp

    Filesize

    132KB

  • memory/3040-47-0x000007FEFB8C0000-0x000007FEFB8D8000-memory.dmp

    Filesize

    96KB

  • memory/3040-49-0x000007FEFB8A0000-0x000007FEFB8B1000-memory.dmp

    Filesize

    68KB

  • memory/3040-50-0x000007FEFB880000-0x000007FEFB891000-memory.dmp

    Filesize

    68KB

  • memory/3040-51-0x000007FEFB860000-0x000007FEFB871000-memory.dmp

    Filesize

    68KB

  • memory/3040-52-0x000007FEFB840000-0x000007FEFB85B000-memory.dmp

    Filesize

    108KB

  • memory/3040-53-0x000007FEFB820000-0x000007FEFB831000-memory.dmp

    Filesize

    68KB

  • memory/3040-54-0x000007FEF7E70000-0x000007FEF7E88000-memory.dmp

    Filesize

    96KB

  • memory/3040-55-0x000007FEF7340000-0x000007FEF7370000-memory.dmp

    Filesize

    192KB

  • memory/3040-56-0x000007FEF6F40000-0x000007FEF6FA7000-memory.dmp

    Filesize

    412KB

  • memory/3040-57-0x000007FEF6EC0000-0x000007FEF6F3C000-memory.dmp

    Filesize

    496KB

  • memory/3040-58-0x000007FEF7320000-0x000007FEF7331000-memory.dmp

    Filesize

    68KB

  • memory/3040-59-0x000007FEF6DB0000-0x000007FEF6E07000-memory.dmp

    Filesize

    348KB

  • memory/3040-60-0x000007FEF72F0000-0x000007FEF7318000-memory.dmp

    Filesize

    160KB

  • memory/3040-61-0x000007FEF6E50000-0x000007FEF6E74000-memory.dmp

    Filesize

    144KB

  • memory/3040-62-0x000007FEF6D90000-0x000007FEF6DA8000-memory.dmp

    Filesize

    96KB

  • memory/3040-48-0x000007FEF5320000-0x000007FEF63D0000-memory.dmp

    Filesize

    16.7MB

  • memory/3040-63-0x000007FEF6D60000-0x000007FEF6D83000-memory.dmp

    Filesize

    140KB

  • memory/3040-64-0x000007FEF6D40000-0x000007FEF6D51000-memory.dmp

    Filesize

    68KB

  • memory/3040-65-0x000007FEF6D20000-0x000007FEF6D32000-memory.dmp

    Filesize

    72KB

  • memory/3040-66-0x000007FEF6CF0000-0x000007FEF6D11000-memory.dmp

    Filesize

    132KB

  • memory/3040-67-0x000007FEF6CD0000-0x000007FEF6CE3000-memory.dmp

    Filesize

    76KB

  • memory/3040-68-0x000007FEF4E80000-0x000007FEF4EA1000-memory.dmp

    Filesize

    132KB

  • memory/3040-69-0x000007FEF4E60000-0x000007FEF4E71000-memory.dmp

    Filesize

    68KB

  • memory/3040-70-0x000007FEF4E40000-0x000007FEF4E57000-memory.dmp

    Filesize

    92KB

  • memory/3040-71-0x000007FEFBD90000-0x000007FEFBDA0000-memory.dmp

    Filesize

    64KB

  • memory/3040-72-0x000007FEF4E10000-0x000007FEF4E3F000-memory.dmp

    Filesize

    188KB

  • memory/3040-73-0x000007FEF4DF0000-0x000007FEF4E01000-memory.dmp

    Filesize

    68KB

  • memory/3040-74-0x000007FEF4DD0000-0x000007FEF4DE6000-memory.dmp

    Filesize

    88KB

  • memory/3040-75-0x000007FEF4D00000-0x000007FEF4DC5000-memory.dmp

    Filesize

    788KB

  • memory/3040-76-0x000007FEF4CB0000-0x000007FEF4CF2000-memory.dmp

    Filesize

    264KB

  • memory/3040-77-0x000007FEF4C40000-0x000007FEF4CA2000-memory.dmp

    Filesize

    392KB

  • memory/3040-78-0x000007FEF4BD0000-0x000007FEF4C3D000-memory.dmp

    Filesize

    436KB

  • memory/3040-79-0x000007FEF4A50000-0x000007FEF4BD0000-memory.dmp

    Filesize

    1.5MB