Analysis
-
max time kernel
140s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 02:33
Behavioral task
behavioral1
Sample
2024-12-26_83125ab9dfa745107a71601710d2fbfa_smoke-loader_wapomi.exe
Resource
win7-20240903-en
General
-
Target
2024-12-26_83125ab9dfa745107a71601710d2fbfa_smoke-loader_wapomi.exe
-
Size
193KB
-
MD5
83125ab9dfa745107a71601710d2fbfa
-
SHA1
15e9191aa572f1478f6d4ba4bfbf78c323eb3a5e
-
SHA256
3720e64a9c7bfd4d158e16924336ae553beb78313657a45d5477142b0693c017
-
SHA512
dbf678d9a76f85b7fffa57baf21f94757889737ea8f073ee7407622d0d23d231345975e2bcd29730676c43cdc335a8d7e2b567731cb324fc448d08a6119bc989
-
SSDEEP
6144:F8ToK31I1qZQxU4ouUnnk4LNaj8co7Ns:FHKlYqZQxUiSnkO6I7
Malware Config
Extracted
bdaejec
ddos.dnsnb8.net
Signatures
-
Bdaejec family
-
Detects Bdaejec Backdoor. 1 IoCs
Bdaejec is backdoor written in C++.
resource yara_rule behavioral2/memory/2032-12-0x0000000000720000-0x0000000000729000-memory.dmp family_bdaejec_backdoor -
Detected Nirsoft tools 1 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral2/memory/1716-10-0x0000000000400000-0x000000000046E000-memory.dmp Nirsoft -
resource yara_rule behavioral2/files/0x000d000000023b0a-3.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation hvRVDMP.exe -
Executes dropped EXE 1 IoCs
pid Process 2032 hvRVDMP.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/1716-0-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral2/memory/1716-10-0x0000000000400000-0x000000000046E000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jre-1.8\bin\keytool.exe hvRVDMP.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe hvRVDMP.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe hvRVDMP.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeBridge\SkypeBridge.exe hvRVDMP.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Time.exe hvRVDMP.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxIdentityProvider_12.50.6001.0_x64__8wekyb3d8bbwe\XboxIdp.exe hvRVDMP.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe hvRVDMP.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\keytool.exe hvRVDMP.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\pack200.exe hvRVDMP.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe hvRVDMP.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\MixedRealityPortal.Brokered.exe hvRVDMP.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jabswitch.exe hvRVDMP.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\policytool.exe hvRVDMP.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\servertool.exe hvRVDMP.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\codecpacks.heif.exe hvRVDMP.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AdobeCollabSync.exe hvRVDMP.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE hvRVDMP.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ONENOTEM.EXE hvRVDMP.exe File opened for modification C:\Program Files\Mozilla Firefox\default-browser-agent.exe hvRVDMP.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\WinStore.App.exe hvRVDMP.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ssvagent.exe hvRVDMP.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe hvRVDMP.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\chrmstp.exe hvRVDMP.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java-rmi.exe hvRVDMP.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\servertool.exe hvRVDMP.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\policytool.exe hvRVDMP.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jcmd.exe hvRVDMP.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\kinit.exe hvRVDMP.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.StorePurchaseApp_11811.1001.18.0_x64__8wekyb3d8bbwe\StoreExperienceHost.exe hvRVDMP.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\AcroLayoutRecognizer.exe hvRVDMP.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\tnameserv.exe hvRVDMP.exe File opened for modification C:\Program Files\Windows Mail\wab.exe hvRVDMP.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\AppInstallerPythonRedirector.exe hvRVDMP.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\3DViewer.exe hvRVDMP.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javapackager.exe hvRVDMP.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\ktab.exe hvRVDMP.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\serialver.exe hvRVDMP.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOHTMED.EXE hvRVDMP.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGameOverlay_1.46.11001.0_x64__8wekyb3d8bbwe\GameBar.exe hvRVDMP.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmiregistry.exe hvRVDMP.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jjs.exe hvRVDMP.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\AppSharingHookController.exe hvRVDMP.exe File opened for modification C:\Program Files\Microsoft Office 15\ClientX64\OfficeClickToRun.exe hvRVDMP.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateCore.exe hvRVDMP.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javac.exe hvRVDMP.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmid.exe hvRVDMP.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOSREC.EXE hvRVDMP.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Common.DBConnection64.exe hvRVDMP.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Maps.exe hvRVDMP.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\extcheck.exe hvRVDMP.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Analysis Services\AS OLEDB\140\SQLDumper.exe hvRVDMP.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\filecompare.exe hvRVDMP.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe hvRVDMP.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javaw.exe hvRVDMP.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\AppVDllSurrogate32.exe hvRVDMP.exe File opened for modification C:\Program Files\Windows Security\BrowserCore\BrowserCore.exe hvRVDMP.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe hvRVDMP.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdate.exe hvRVDMP.exe File opened for modification C:\Program Files\Windows Photo Viewer\ImagingDevices.exe hvRVDMP.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exe hvRVDMP.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jinfo.exe hvRVDMP.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\ssvagent.exe hvRVDMP.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoasb.exe hvRVDMP.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\protocolhandler.exe hvRVDMP.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hvRVDMP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-12-26_83125ab9dfa745107a71601710d2fbfa_smoke-loader_wapomi.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1716 2024-12-26_83125ab9dfa745107a71601710d2fbfa_smoke-loader_wapomi.exe 1716 2024-12-26_83125ab9dfa745107a71601710d2fbfa_smoke-loader_wapomi.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1716 wrote to memory of 2032 1716 2024-12-26_83125ab9dfa745107a71601710d2fbfa_smoke-loader_wapomi.exe 85 PID 1716 wrote to memory of 2032 1716 2024-12-26_83125ab9dfa745107a71601710d2fbfa_smoke-loader_wapomi.exe 85 PID 1716 wrote to memory of 2032 1716 2024-12-26_83125ab9dfa745107a71601710d2fbfa_smoke-loader_wapomi.exe 85 PID 2032 wrote to memory of 932 2032 hvRVDMP.exe 101 PID 2032 wrote to memory of 932 2032 hvRVDMP.exe 101 PID 2032 wrote to memory of 932 2032 hvRVDMP.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-12-26_83125ab9dfa745107a71601710d2fbfa_smoke-loader_wapomi.exe"C:\Users\Admin\AppData\Local\Temp\2024-12-26_83125ab9dfa745107a71601710d2fbfa_smoke-loader_wapomi.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\hvRVDMP.exeC:\Users\Admin\AppData\Local\Temp\hvRVDMP.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5e7e4ef5.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:932
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
189B
MD57be98bb47d4950ae58839bc3dd49b00a
SHA1245d0f1d6b12c3503337c808b9fb8cb5486bb4c8
SHA25625a5c0972011944d0264be6e26ba5a132039758a85712e4515d7538f6fc34d02
SHA512e9f8f33a837398bfee4f77bfb8facef184bb7d5c25b7a0d88f1f1109094b50b084445d7cd6177ab0ba7d7d6e1430437e6a301c11131e4b441b839d43357b10b6
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e