Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
28-12-2024 08:43
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-28_ac90e952b3508491540fd42dfec638cf_mafia_wapomi.exe
Resource
win7-20241023-en
General
-
Target
2024-12-28_ac90e952b3508491540fd42dfec638cf_mafia_wapomi.exe
-
Size
187KB
-
MD5
ac90e952b3508491540fd42dfec638cf
-
SHA1
aebe6fe632a0edcab4ee320d7de3b0a691373336
-
SHA256
8dab5f1113bde28029437a289054e66212202e3490664562f16833dfdbe174a7
-
SHA512
83f5769910737f8aecb41dcc0c8afbf90af36503102999badb7a0bd59a53b603cfea530aafaddd986318fa510081d54b3e510439bcf877352f77f0090664eee3
-
SSDEEP
3072:uLKCpw8DA3Yr3mUOJfXEEZnRCI3AXny/Hj8LG4MVj/FIgW6dvn3mxIO3GCH:e83YLmUOFXEEZnRCI3AXny/Hj8LG4ujb
Malware Config
Extracted
bdaejec
ddos.dnsnb8.net
Signatures
-
Bdaejec family
-
Detects Bdaejec Backdoor. 1 IoCs
Bdaejec is backdoor written in C++.
resource yara_rule behavioral1/memory/580-14-0x00000000011E0000-0x00000000011E9000-memory.dmp family_bdaejec_backdoor -
resource yara_rule behavioral1/files/0x000d000000012280-8.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 580 Srkhxf.exe -
Loads dropped DLL 2 IoCs
pid Process 1268 2024-12-28_ac90e952b3508491540fd42dfec638cf_mafia_wapomi.exe 1268 2024-12-28_ac90e952b3508491540fd42dfec638cf_mafia_wapomi.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\unpack200.exe Srkhxf.exe File opened for modification C:\Program Files\Java\jre7\bin\rmid.exe Srkhxf.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\bckgzm.exe Srkhxf.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\shvlzm.exe Srkhxf.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe Srkhxf.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe Srkhxf.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\SC_Reader.exe Srkhxf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOHTMED.EXE Srkhxf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SELFCERT.EXE Srkhxf.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe Srkhxf.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jinfo.exe Srkhxf.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroBroker.exe Srkhxf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOUC.EXE Srkhxf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE Srkhxf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE Srkhxf.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jcmd.exe Srkhxf.exe File opened for modification C:\Program Files\Java\jre7\bin\klist.exe Srkhxf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE Srkhxf.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\sidebar.exe Srkhxf.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe Srkhxf.exe File opened for modification C:\Program Files\Windows Sidebar\sidebar.exe Srkhxf.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\A3DUtility.exe Srkhxf.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateBroker.exe Srkhxf.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\schemagen.exe Srkhxf.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java.exe Srkhxf.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\klist.exe Srkhxf.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\FreeCell.exe Srkhxf.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe Srkhxf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SETLANG.EXE Srkhxf.exe File opened for modification C:\Program Files (x86)\Windows Mail\wabmig.exe Srkhxf.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\idlj.exe Srkhxf.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec.exe Srkhxf.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\106.0.5249.119\chrome_installer.exe Srkhxf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CLVIEW.EXE Srkhxf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONENOTE.EXE Srkhxf.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javafxpackager.exe Srkhxf.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstat.exe Srkhxf.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java-rmi.exe Srkhxf.exe File opened for modification C:\Program Files\Java\jre7\bin\ktab.exe Srkhxf.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\Setup.exe Srkhxf.exe File opened for modification C:\Program Files (x86)\Google\Update\DisabledGoogleUpdate.exe Srkhxf.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jar.exe Srkhxf.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javadoc.exe Srkhxf.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\xjc.exe Srkhxf.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\Mahjong.exe Srkhxf.exe File opened for modification C:\Program Files\Windows Defender\MSASCui.exe Srkhxf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\NAMECONTROLSERVER.EXE Srkhxf.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe Srkhxf.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaws.exe Srkhxf.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\keytool.exe Srkhxf.exe File opened for modification C:\Program Files\Java\jre7\bin\java-rmi.exe Srkhxf.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe Srkhxf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSACCESS.EXE Srkhxf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SCANPST.EXE Srkhxf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Wordconv.exe Srkhxf.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe Srkhxf.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaw.exe Srkhxf.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmid.exe Srkhxf.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\wsimport.exe Srkhxf.exe File opened for modification C:\Program Files\Microsoft Office\Office14\MSOHTMED.EXE Srkhxf.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe Srkhxf.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\extcheck.exe Srkhxf.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java-rmi.exe Srkhxf.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmap.exe Srkhxf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-12-28_ac90e952b3508491540fd42dfec638cf_mafia_wapomi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Srkhxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1268 wrote to memory of 580 1268 2024-12-28_ac90e952b3508491540fd42dfec638cf_mafia_wapomi.exe 32 PID 1268 wrote to memory of 580 1268 2024-12-28_ac90e952b3508491540fd42dfec638cf_mafia_wapomi.exe 32 PID 1268 wrote to memory of 580 1268 2024-12-28_ac90e952b3508491540fd42dfec638cf_mafia_wapomi.exe 32 PID 1268 wrote to memory of 580 1268 2024-12-28_ac90e952b3508491540fd42dfec638cf_mafia_wapomi.exe 32 PID 580 wrote to memory of 1432 580 Srkhxf.exe 36 PID 580 wrote to memory of 1432 580 Srkhxf.exe 36 PID 580 wrote to memory of 1432 580 Srkhxf.exe 36 PID 580 wrote to memory of 1432 580 Srkhxf.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-12-28_ac90e952b3508491540fd42dfec638cf_mafia_wapomi.exe"C:\Users\Admin\AppData\Local\Temp\2024-12-28_ac90e952b3508491540fd42dfec638cf_mafia_wapomi.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\Srkhxf.exeC:\Users\Admin\AppData\Local\Temp\Srkhxf.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\1bf60174.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:1432
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
187B
MD5cc8c8199ef9e99e6a0dfb1319c233ba8
SHA1d4755e5630e26dd3642d7ce93221e9723d74775a
SHA256b358e92ca2ead904fd087e109631249c237a4c94ca097aeb57453e9e5889f534
SHA512381e928ce6e15d55b6737a1a6f134548d84be01a415d1ffb0967e6b534c145578adbfaf19ae4b61503f7229cfa0a2c8659482cc1c6595e492527ce712a6aeef3
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e