Analysis
-
max time kernel
140s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2024 14:26
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-25_b0e11cdafd928e9ab7266a4dd8fe2acd_mafia_wapomi.exe
Resource
win7-20240903-en
General
-
Target
2024-12-25_b0e11cdafd928e9ab7266a4dd8fe2acd_mafia_wapomi.exe
-
Size
1.6MB
-
MD5
b0e11cdafd928e9ab7266a4dd8fe2acd
-
SHA1
2555169ab8aa8ee6f4f8d9fa3c8812b63acbb0c5
-
SHA256
1245acd2ab8996d3de89c9c19ec60582b844c11d0572ddb5b0cdf9a34c08839f
-
SHA512
e2c1b2f146a9c75fc8f85f9f2ca52d52ad488042950cc1f1d12ad9509e130577c51311e55e1791e017b073118cc0750575c79b8b266bf722c4c8bb5a67d7476d
-
SSDEEP
49152:XE4XbjEKOh3SbiwJjn7gu5LUvdW9apuLvht/cionurM0EIMa1:Xrj834iwJjn7gu5LmMapuNiiMurM0
Malware Config
Extracted
bdaejec
ddos.dnsnb8.net
Signatures
-
Bdaejec family
-
Detects Bdaejec Backdoor. 1 IoCs
Bdaejec is backdoor written in C++.
resource yara_rule behavioral2/memory/4864-11-0x0000000000D80000-0x0000000000D89000-memory.dmp family_bdaejec_backdoor -
resource yara_rule behavioral2/files/0x000b000000023b69-3.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 4864 RXOewY.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Client\AppVDllSurrogate32.exe RXOewY.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\AppVLP.exe RXOewY.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroTextExtractor.exe RXOewY.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jp2launcher.exe RXOewY.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DWTRIG20.EXE RXOewY.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe RXOewY.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe RXOewY.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javap.exe RXOewY.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jhat.exe RXOewY.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\PilotshubApp.exe RXOewY.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleCrashHandler.exe RXOewY.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jjs.exe RXOewY.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\tnameserv.exe RXOewY.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\protocolhandler.exe RXOewY.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\HxOutlook.exe RXOewY.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\YourPhone.exe RXOewY.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\servertool.exe RXOewY.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\EQUATION\eqnedt32.exe RXOewY.exe File opened for modification C:\Program Files\Windows Photo Viewer\ImagingDevices.exe RXOewY.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe RXOewY.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\keytool.exe RXOewY.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\VPREVIEW.EXE RXOewY.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\AppInstallerElevatedAppServiceClient.exe RXOewY.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\XboxApp.exe RXOewY.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jmap.exe RXOewY.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\unpack200.exe RXOewY.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoia.exe RXOewY.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SETLANG.EXE RXOewY.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\WCChromeNativeMessagingHost.exe RXOewY.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\native2ascii.exe RXOewY.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javaw.exe RXOewY.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\orbd.exe RXOewY.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\GRAPH.EXE RXOewY.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\POWERPNT.EXE RXOewY.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\DATABASECOMPARE.EXE RXOewY.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGameOverlay_1.46.11001.0_x64__8wekyb3d8bbwe\GameBar.exe RXOewY.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\createdump.exe RXOewY.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe RXOewY.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\extcheck.exe RXOewY.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PerfBoost.exe RXOewY.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\AppSharingHookController.exe RXOewY.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_x64__8wekyb3d8bbwe\GetHelp.exe RXOewY.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeBackgroundHost.exe RXOewY.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeBridge\SkypeBridge.exe RXOewY.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Video.UI.exe RXOewY.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\ktab.exe RXOewY.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PPTICO.EXE RXOewY.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\helper.exe RXOewY.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Xbox.TCUI_1.23.28002.0_x64__8wekyb3d8bbwe\TCUI-App.exe RXOewY.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\createdump.exe RXOewY.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\chrome_pwa_launcher.exe RXOewY.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javapackager.exe RXOewY.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\AppVDllSurrogate64.exe RXOewY.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\View3D.ResourceResolver.exe RXOewY.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_x64__8wekyb3d8bbwe\Microsoft.MicrosoftSolitaireCollection.exe RXOewY.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\codecpacks.webp.exe RXOewY.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe RXOewY.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\unpack200.exe RXOewY.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\officeappguardwin32.exe RXOewY.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe RXOewY.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\wow_helper.exe RXOewY.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe RXOewY.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jconsole.exe RXOewY.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\Win32Bridge.Server.exe RXOewY.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\inf\oem0.PNF 2024-12-25_b0e11cdafd928e9ab7266a4dd8fe2acd_mafia_wapomi.exe File created C:\Windows\inf\oem1.PNF 2024-12-25_b0e11cdafd928e9ab7266a4dd8fe2acd_mafia_wapomi.exe File created C:\Windows\inf\oem2.PNF 2024-12-25_b0e11cdafd928e9ab7266a4dd8fe2acd_mafia_wapomi.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-12-25_b0e11cdafd928e9ab7266a4dd8fe2acd_mafia_wapomi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RXOewY.exe -
Checks SCSI registry key(s) 3 TTPs 12 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID 2024-12-25_b0e11cdafd928e9ab7266a4dd8fe2acd_mafia_wapomi.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID 2024-12-25_b0e11cdafd928e9ab7266a4dd8fe2acd_mafia_wapomi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 2024-12-25_b0e11cdafd928e9ab7266a4dd8fe2acd_mafia_wapomi.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags 2024-12-25_b0e11cdafd928e9ab7266a4dd8fe2acd_mafia_wapomi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 2024-12-25_b0e11cdafd928e9ab7266a4dd8fe2acd_mafia_wapomi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 2024-12-25_b0e11cdafd928e9ab7266a4dd8fe2acd_mafia_wapomi.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags 2024-12-25_b0e11cdafd928e9ab7266a4dd8fe2acd_mafia_wapomi.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID 2024-12-25_b0e11cdafd928e9ab7266a4dd8fe2acd_mafia_wapomi.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID 2024-12-25_b0e11cdafd928e9ab7266a4dd8fe2acd_mafia_wapomi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 2024-12-25_b0e11cdafd928e9ab7266a4dd8fe2acd_mafia_wapomi.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom 2024-12-25_b0e11cdafd928e9ab7266a4dd8fe2acd_mafia_wapomi.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom 2024-12-25_b0e11cdafd928e9ab7266a4dd8fe2acd_mafia_wapomi.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2228 wrote to memory of 4864 2228 2024-12-25_b0e11cdafd928e9ab7266a4dd8fe2acd_mafia_wapomi.exe 83 PID 2228 wrote to memory of 4864 2228 2024-12-25_b0e11cdafd928e9ab7266a4dd8fe2acd_mafia_wapomi.exe 83 PID 2228 wrote to memory of 4864 2228 2024-12-25_b0e11cdafd928e9ab7266a4dd8fe2acd_mafia_wapomi.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-12-25_b0e11cdafd928e9ab7266a4dd8fe2acd_mafia_wapomi.exe"C:\Users\Admin\AppData\Local\Temp\2024-12-25_b0e11cdafd928e9ab7266a4dd8fe2acd_mafia_wapomi.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\RXOewY.exeC:\Users\Admin\AppData\Local\Temp\RXOewY.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:4864
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e