Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-01-2025 19:47
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-02_def33126d859994ae2e3ba299ab3dfba_smoke-loader_wapomi.exe
Resource
win7-20240903-en
General
-
Target
2025-01-02_def33126d859994ae2e3ba299ab3dfba_smoke-loader_wapomi.exe
-
Size
36KB
-
MD5
def33126d859994ae2e3ba299ab3dfba
-
SHA1
b0898d36b644d90b0cd8d5eb93df1f6af384ba69
-
SHA256
5d82a9d94f4bedcce53639e80b7739a97a19586a34d5107948265349cec7537e
-
SHA512
7dc1a5ea0ae73898489487751cfe6169f18dbf17f8c4c904c5b4981f9e2e6d090c45aac39b9d64697aa6291a341f28d471a5c02a763fc36357f2b12a87729d2e
-
SSDEEP
768:aA+m41HKUpOv068E4Mf4MMRt4MtV2n5G8QGPL4vzZq2o9W7GsxBbPr:aA+m6qqOcVEP87T2n5GfGCq2iW7z
Malware Config
Extracted
bdaejec
ddos.dnsnb8.net
Signatures
-
Bdaejec family
-
Detects Bdaejec Backdoor. 1 IoCs
Bdaejec is backdoor written in C++.
resource yara_rule behavioral2/memory/3620-8-0x0000000000BC0000-0x0000000000BC9000-memory.dmp family_bdaejec_backdoor -
resource yara_rule behavioral2/files/0x000b000000023b60-5.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation eItv.exe -
Executes dropped EXE 1 IoCs
pid Process 3620 eItv.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrServicesUpdater.exe eItv.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\orbd.exe eItv.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe eItv.exe File opened for modification C:\Program Files (x86)\Windows Mail\wabmig.exe eItv.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\servertool.exe eItv.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javap.exe eItv.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe eItv.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe eItv.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe eItv.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\idlj.exe eItv.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\rmid.exe eItv.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jjs.exe eItv.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_x64__8wekyb3d8bbwe\Microsoft.MicrosoftSolitaireCollection.exe eItv.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleCrashHandler64.exe eItv.exe File opened for modification C:\Program Files\7-Zip\7zG.exe eItv.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jhat.exe eItv.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\unpack200.exe eItv.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\klist.exe eItv.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\rmid.exe eItv.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Time.exe eItv.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\HxOutlook.exe eItv.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\YourPhone.exe eItv.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\appletviewer.exe eItv.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javaws.exe eItv.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOICONS.EXE eItv.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Smart Tag\SmartTagInstall.exe eItv.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\schemagen.exe eItv.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\excelcnv.exe eItv.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe eItv.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javapackager.exe eItv.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\unpack200.exe eItv.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.Loader.exe eItv.exe File opened for modification C:\Program Files\Windows Photo Viewer\ImagingDevices.exe eItv.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\fmui\fmui.exe eItv.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\ScreenSketch.exe eItv.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exe eItv.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\Uninstall.exe eItv.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\keytool.exe eItv.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javacpl.exe eItv.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\MixedRealityPortal.exe eItv.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Maps.exe eItv.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\klist.exe eItv.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jmap.exe eItv.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\protocolhandler.exe eItv.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jconsole.exe eItv.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\misc.exe eItv.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SDXHelperBgt.exe eItv.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGameOverlay_1.46.11001.0_x64__8wekyb3d8bbwe\GameBar.exe eItv.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\tnameserv.exe eItv.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jps.exe eItv.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstack.exe eItv.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsgen.exe eItv.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\Addons\OneDriveSetup.exe eItv.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\Integrator.exe eItv.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSQRY32.EXE eItv.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\EQUATION\eqnedt32.exe eItv.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\createdump.exe eItv.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\wow_helper.exe eItv.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Common.DBConnection.exe eItv.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jp2launcher.exe eItv.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ORGCHART.EXE eItv.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeBackgroundHost.exe eItv.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jinfo.exe eItv.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe eItv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eItv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-01-02_def33126d859994ae2e3ba299ab3dfba_smoke-loader_wapomi.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 320 2025-01-02_def33126d859994ae2e3ba299ab3dfba_smoke-loader_wapomi.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 320 wrote to memory of 3620 320 2025-01-02_def33126d859994ae2e3ba299ab3dfba_smoke-loader_wapomi.exe 83 PID 320 wrote to memory of 3620 320 2025-01-02_def33126d859994ae2e3ba299ab3dfba_smoke-loader_wapomi.exe 83 PID 320 wrote to memory of 3620 320 2025-01-02_def33126d859994ae2e3ba299ab3dfba_smoke-loader_wapomi.exe 83 PID 3620 wrote to memory of 2404 3620 eItv.exe 101 PID 3620 wrote to memory of 2404 3620 eItv.exe 101 PID 3620 wrote to memory of 2404 3620 eItv.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-01-02_def33126d859994ae2e3ba299ab3dfba_smoke-loader_wapomi.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-02_def33126d859994ae2e3ba299ab3dfba_smoke-loader_wapomi.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Users\Admin\AppData\Local\Temp\eItv.exeC:\Users\Admin\AppData\Local\Temp\eItv.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\32252dfd.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:2404
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
183B
MD52a68680ee9cd1689b054ca712d8e6766
SHA1eae0279b3e9cfad3b4b93af253331d2427123d08
SHA25647971b74480ecefa245b698144e0bd95725023083c9254187b8ba783cb513c8c
SHA512d4f7975a0b36fa2606e7cb3069e71123c03dc129feb3081d48a69bfdf635e74dda4d5b937f30d717abf7796a40d29402ae061722e1fbc1f7557a300e1f13ab71
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e