Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-01-2025 20:33
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe
-
Size
522KB
-
MD5
7b9fcac85230085b3970bc6dd14fffe0
-
SHA1
76f810ca084d2f34cbaa6871f6ab9ecc0052f51c
-
SHA256
cdde573c9802ae7d258b2fd3d1c9f3a1a35eac60df830b9cdc0784fffbf218ce
-
SHA512
b48a92d5f64af406cabe21432604a731ad02a3ef616c818d89e07094ddfda83f946e349635d4a4eef668647fc5e9f7eeb9df65f5a023865f3d23cc491586c1e5
-
SSDEEP
12288:1EdwCWMjXMij2klpvNe63KYjm2xGSyEP:1EdwOrBp1ess
Malware Config
Extracted
bdaejec
1.dnsnb8.net
Signatures
-
Bdaejec family
-
Detects Bdaejec Backdoor. 1 IoCs
Bdaejec is backdoor written in C++.
resource yara_rule behavioral1/memory/332-121-0x0000000000FB0000-0x0000000000FB9000-memory.dmp family_bdaejec_backdoor -
resource yara_rule behavioral1/files/0x000c000000012266-8.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 332 4fe74739.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\launcher.exe 4fe74739.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec.exe 4fe74739.exe File opened for modification C:\Program Files\Java\jre7\bin\ktab.exe 4fe74739.exe File opened for modification C:\Program Files\Windows Journal\PDIALOG.exe 4fe74739.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSTORDB.EXE 4fe74739.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONENOTE.EXE 4fe74739.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec64.exe 4fe74739.exe File opened for modification C:\Program Files\Microsoft Office\Office14\MSOHTMED.EXE 4fe74739.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateBroker.exe 4fe74739.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SETLANG.EXE 4fe74739.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE 4fe74739.exe File opened for modification C:\Program Files\DVD Maker\DVDMaker.exe 4fe74739.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jar.exe 4fe74739.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GRAPH.EXE 4fe74739.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\NAMECONTROLSERVER.EXE 4fe74739.exe File opened for modification C:\Program Files (x86)\Windows Mail\wab.exe 4fe74739.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\keytool.exe 4fe74739.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\xjc.exe 4fe74739.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaws.exe 4fe74739.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\MineSweeper.exe 4fe74739.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\shvlzm.exe 4fe74739.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSTORE.EXE 4fe74739.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jconsole.exe 4fe74739.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\orbd.exe 4fe74739.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\tnameserv.exe 4fe74739.exe File opened for modification C:\Program Files\Java\jre7\bin\jabswitch.exe 4fe74739.exe File opened for modification C:\Program Files\Java\jre7\bin\jp2launcher.exe 4fe74739.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe 4fe74739.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateOnDemand.exe 4fe74739.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\servertool.exe 4fe74739.exe File opened for modification C:\Program Files\Java\jre7\bin\javacpl.exe 4fe74739.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe 4fe74739.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe 4fe74739.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE 4fe74739.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SCANPST.EXE 4fe74739.exe File opened for modification C:\Program Files (x86)\Windows Mail\wabmig.exe 4fe74739.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javadoc.exe 4fe74739.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmc.exe 4fe74739.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\Setup.exe 4fe74739.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\misc.exe 4fe74739.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOSYNC.EXE 4fe74739.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSPUB.EXE 4fe74739.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe 4fe74739.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jcmd.exe 4fe74739.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jps.exe 4fe74739.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\wsimport.exe 4fe74739.exe File opened for modification C:\Program Files\Java\jre7\bin\java-rmi.exe 4fe74739.exe File opened for modification C:\Program Files\Windows Mail\wabmig.exe 4fe74739.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\LogTransport2.exe 4fe74739.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{5EB8F02B-573C-439E-BE36-635B3B6563D9}\chrome_installer.exe 4fe74739.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE 4fe74739.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe 4fe74739.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\appletviewer.exe 4fe74739.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jsadebugd.exe 4fe74739.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\klist.exe 4fe74739.exe File opened for modification C:\Program Files\Java\jre7\bin\rmid.exe 4fe74739.exe File opened for modification C:\Program Files\Java\jre7\bin\ssvagent.exe 4fe74739.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\FreeCell.exe 4fe74739.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe 4fe74739.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\106.0.5249.119\chrome_installer.exe 4fe74739.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javac.exe 4fe74739.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstat.exe 4fe74739.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java.exe 4fe74739.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ssvagent.exe 4fe74739.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4fe74739.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2552 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 2552 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2552 wrote to memory of 332 2552 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 31 PID 2552 wrote to memory of 332 2552 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 31 PID 2552 wrote to memory of 332 2552 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 31 PID 2552 wrote to memory of 332 2552 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 31 PID 2552 wrote to memory of 1216 2552 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 21 PID 2552 wrote to memory of 1216 2552 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 21 PID 2552 wrote to memory of 1216 2552 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 21 PID 2552 wrote to memory of 1216 2552 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 21 PID 2552 wrote to memory of 1216 2552 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 21 PID 2552 wrote to memory of 1216 2552 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 21 PID 2552 wrote to memory of 1216 2552 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 21 PID 2552 wrote to memory of 1216 2552 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 21 PID 2552 wrote to memory of 1216 2552 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 21 PID 2552 wrote to memory of 1216 2552 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 21 PID 2552 wrote to memory of 1216 2552 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 21 PID 2552 wrote to memory of 1216 2552 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 21 PID 2552 wrote to memory of 1216 2552 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 21 PID 2552 wrote to memory of 1216 2552 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 21 PID 2552 wrote to memory of 1216 2552 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 21 PID 2552 wrote to memory of 1216 2552 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 21 PID 2552 wrote to memory of 1216 2552 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 21 PID 2552 wrote to memory of 1216 2552 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 21 PID 2552 wrote to memory of 1216 2552 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 21 PID 2552 wrote to memory of 1216 2552 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 21 PID 2552 wrote to memory of 1216 2552 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 21 PID 2552 wrote to memory of 1216 2552 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 21 PID 2552 wrote to memory of 1216 2552 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 21 PID 2552 wrote to memory of 1216 2552 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 21 PID 2552 wrote to memory of 1216 2552 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 21 PID 2552 wrote to memory of 1216 2552 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 21 PID 2552 wrote to memory of 1216 2552 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 21 PID 2552 wrote to memory of 1216 2552 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 21 PID 2552 wrote to memory of 1216 2552 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 21 PID 2552 wrote to memory of 1216 2552 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 21 PID 2552 wrote to memory of 1216 2552 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 21 PID 2552 wrote to memory of 1216 2552 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 21 PID 2552 wrote to memory of 1216 2552 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 21 PID 2552 wrote to memory of 1216 2552 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 21 PID 2552 wrote to memory of 1216 2552 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 21 PID 2552 wrote to memory of 1216 2552 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 21 PID 2552 wrote to memory of 1216 2552 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 21 PID 2552 wrote to memory of 1216 2552 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 21 PID 2552 wrote to memory of 1216 2552 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 21 PID 2552 wrote to memory of 1216 2552 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 21 PID 2552 wrote to memory of 1216 2552 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 21 PID 2552 wrote to memory of 1216 2552 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 21 PID 2552 wrote to memory of 1216 2552 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 21 PID 2552 wrote to memory of 1216 2552 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 21 PID 2552 wrote to memory of 1216 2552 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 21 PID 2552 wrote to memory of 1216 2552 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 21 PID 2552 wrote to memory of 1216 2552 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 21 PID 2552 wrote to memory of 1216 2552 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 21 PID 2552 wrote to memory of 1216 2552 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 21 PID 2552 wrote to memory of 1216 2552 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 21 PID 2552 wrote to memory of 1216 2552 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 21 PID 2552 wrote to memory of 1216 2552 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 21 PID 2552 wrote to memory of 1216 2552 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 21 PID 2552 wrote to memory of 1216 2552 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 21 PID 2552 wrote to memory of 1216 2552 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 21 PID 2552 wrote to memory of 1216 2552 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 21 PID 2552 wrote to memory of 1216 2552 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 21 PID 2552 wrote to memory of 1216 2552 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 21 PID 2552 wrote to memory of 1216 2552 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 21 PID 2552 wrote to memory of 1216 2552 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\4fe74739.exeC:\4fe74739.exe3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:332 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\66c04927.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:1716
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD5e351365b4bc9f244b8424288e2cdbcbd
SHA1f2d70670f8d230a59b453ae4cf4738e7675221a2
SHA256d511d476b6777335ed6d1bc3ce7efdf84a91bf04a6514c263c28caec186e09ee
SHA512263f3db3f4d4d7e4d8cfef8663ab9dbebfa3f6606c1eca0fe0fbcaa867e0980617972d1e15c888fd7c849b4d17e457e877991c55ea82c10e8033662e26520864
-
Filesize
4B
MD5d3b07384d113edec49eaa6238ad5ff00
SHA1f1d2d2f924e986ac86fdf7b36c94bcdf32beec15
SHA256b5bb9d8014a0f9b1d61e21e796d78dccdf1352f23cd32812f4850b878ae4944c
SHA5120cf9180a764aba863a67b6d72f0918bc131c6772642cb2dce5a34f0a702f9470ddc2bf125c12198b1995c233c34b4afd346c54a2334c350a948a51b6e8b4e6b6
-
Filesize
129B
MD5e0133c1dd301cf7166c4d425edf25be5
SHA185c43b07d9764df4eb28d85bac3f93f9497535e5
SHA256a17f06fee0820ed27793781d4c97bfc8fc37ecf0ea9954055a8edf8b76b753b8
SHA512d836ff25baed84cf1a3a0c1c783b5198640b46934b9b759da88f74480f03db90971883b671a5c781e9665a3b34744c100f9f92128b59d354db2d72ab5fa26f08