Analysis
-
max time kernel
95s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-01-2025 20:33
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe
-
Size
522KB
-
MD5
7b9fcac85230085b3970bc6dd14fffe0
-
SHA1
76f810ca084d2f34cbaa6871f6ab9ecc0052f51c
-
SHA256
cdde573c9802ae7d258b2fd3d1c9f3a1a35eac60df830b9cdc0784fffbf218ce
-
SHA512
b48a92d5f64af406cabe21432604a731ad02a3ef616c818d89e07094ddfda83f946e349635d4a4eef668647fc5e9f7eeb9df65f5a023865f3d23cc491586c1e5
-
SSDEEP
12288:1EdwCWMjXMij2klpvNe63KYjm2xGSyEP:1EdwOrBp1ess
Malware Config
Extracted
bdaejec
1.dnsnb8.net
Signatures
-
Bdaejec family
-
Detects Bdaejec Backdoor. 1 IoCs
Bdaejec is backdoor written in C++.
resource yara_rule behavioral2/memory/5084-47-0x0000000000830000-0x0000000000839000-memory.dmp family_bdaejec_backdoor -
resource yara_rule behavioral2/files/0x000c000000023b28-3.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 4fe74739.exe -
Executes dropped EXE 1 IoCs
pid Process 5084 4fe74739.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOICONS.EXE 4fe74739.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe 4fe74739.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoadfsb.exe 4fe74739.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE 4fe74739.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\kinit.exe 4fe74739.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\tnameserv.exe 4fe74739.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe 4fe74739.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmic.exe 4fe74739.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\serialver.exe 4fe74739.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\createdump.exe 4fe74739.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\AppInstallerPythonRedirector.exe 4fe74739.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\pack200.exe 4fe74739.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE 4fe74739.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOXMLED.EXE 4fe74739.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Smart Tag\SmartTagInstall.exe 4fe74739.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Maps.exe 4fe74739.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javapackager.exe 4fe74739.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaws.exe 4fe74739.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\pack200.exe 4fe74739.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Microsoft.Msn.Weather.exe 4fe74739.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\ScreenSketch.exe 4fe74739.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Xbox.TCUI_1.23.28002.0_x64__8wekyb3d8bbwe\TCUI-App.exe 4fe74739.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe 4fe74739.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jsadebugd.exe 4fe74739.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOSYNC.EXE 4fe74739.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_x64__8wekyb3d8bbwe\Solitaire.exe 4fe74739.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_3.6.73.0_x64__8wekyb3d8bbwe\Microsoft.Notes.exe 4fe74739.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeBackgroundHost.exe 4fe74739.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_x64__8wekyb3d8bbwe\Microsoft.WebMediaExtensions.exe 4fe74739.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Time.exe 4fe74739.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jjs.exe 4fe74739.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jjs.exe 4fe74739.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\WinStore.App.exe 4fe74739.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGameOverlay_1.46.11001.0_x64__8wekyb3d8bbwe\GameBar.exe 4fe74739.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\keytool.exe 4fe74739.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOSREC.EXE 4fe74739.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\codecpacks.heif.exe 4fe74739.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32Info.exe 4fe74739.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\123.0.6312.123\chrome_installer.exe 4fe74739.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE 4fe74739.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\NAMECONTROLSERVER.EXE 4fe74739.exe File opened for modification C:\Program Files\Mozilla Firefox\private_browsing.exe 4fe74739.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\klist.exe 4fe74739.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\XLICONS.EXE 4fe74739.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jabswitch.exe 4fe74739.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\AppInstallerElevatedAppServiceClient.exe 4fe74739.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdeps.exe 4fe74739.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstat.exe 4fe74739.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsgen.exe 4fe74739.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javacpl.exe 4fe74739.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\WORDICON.EXE 4fe74739.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\AppSharingHookController.exe 4fe74739.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe 4fe74739.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jcmd.exe 4fe74739.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\orbd.exe 4fe74739.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javaw.exe 4fe74739.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\servertool.exe 4fe74739.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoia.exe 4fe74739.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleCrashHandler.exe 4fe74739.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe 4fe74739.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\ktab.exe 4fe74739.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.NetFX40.exe 4fe74739.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\OLicenseHeartbeat.exe 4fe74739.exe File opened for modification C:\Program Files\Windows Security\BrowserCore\BrowserCore.exe 4fe74739.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4fe74739.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1980 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 1980 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe -
Suspicious use of WriteProcessMemory 62 IoCs
description pid Process procid_target PID 1980 wrote to memory of 5084 1980 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 82 PID 1980 wrote to memory of 5084 1980 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 82 PID 1980 wrote to memory of 5084 1980 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 82 PID 1980 wrote to memory of 3484 1980 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 56 PID 1980 wrote to memory of 3484 1980 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 56 PID 1980 wrote to memory of 3484 1980 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 56 PID 1980 wrote to memory of 3484 1980 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 56 PID 1980 wrote to memory of 3484 1980 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 56 PID 1980 wrote to memory of 3484 1980 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 56 PID 1980 wrote to memory of 3484 1980 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 56 PID 1980 wrote to memory of 3484 1980 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 56 PID 1980 wrote to memory of 3484 1980 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 56 PID 1980 wrote to memory of 3484 1980 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 56 PID 1980 wrote to memory of 3484 1980 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 56 PID 1980 wrote to memory of 3484 1980 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 56 PID 1980 wrote to memory of 3484 1980 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 56 PID 1980 wrote to memory of 3484 1980 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 56 PID 1980 wrote to memory of 3484 1980 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 56 PID 1980 wrote to memory of 3484 1980 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 56 PID 1980 wrote to memory of 3484 1980 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 56 PID 1980 wrote to memory of 3484 1980 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 56 PID 1980 wrote to memory of 3484 1980 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 56 PID 1980 wrote to memory of 3484 1980 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 56 PID 1980 wrote to memory of 3484 1980 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 56 PID 1980 wrote to memory of 3484 1980 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 56 PID 1980 wrote to memory of 3484 1980 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 56 PID 1980 wrote to memory of 3484 1980 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 56 PID 1980 wrote to memory of 3484 1980 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 56 PID 1980 wrote to memory of 3484 1980 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 56 PID 1980 wrote to memory of 3484 1980 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 56 PID 1980 wrote to memory of 3484 1980 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 56 PID 1980 wrote to memory of 3484 1980 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 56 PID 1980 wrote to memory of 3484 1980 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 56 PID 1980 wrote to memory of 3484 1980 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 56 PID 1980 wrote to memory of 3484 1980 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 56 PID 1980 wrote to memory of 3484 1980 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 56 PID 1980 wrote to memory of 3484 1980 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 56 PID 1980 wrote to memory of 3484 1980 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 56 PID 1980 wrote to memory of 3484 1980 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 56 PID 1980 wrote to memory of 3484 1980 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 56 PID 1980 wrote to memory of 3484 1980 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 56 PID 1980 wrote to memory of 3484 1980 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 56 PID 1980 wrote to memory of 3484 1980 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 56 PID 1980 wrote to memory of 3484 1980 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 56 PID 1980 wrote to memory of 3484 1980 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 56 PID 1980 wrote to memory of 3484 1980 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 56 PID 1980 wrote to memory of 3484 1980 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 56 PID 1980 wrote to memory of 3484 1980 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 56 PID 1980 wrote to memory of 3484 1980 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 56 PID 1980 wrote to memory of 3484 1980 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 56 PID 1980 wrote to memory of 3484 1980 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 56 PID 1980 wrote to memory of 3484 1980 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 56 PID 1980 wrote to memory of 3484 1980 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 56 PID 1980 wrote to memory of 3484 1980 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 56 PID 1980 wrote to memory of 3484 1980 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 56 PID 1980 wrote to memory of 3484 1980 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 56 PID 1980 wrote to memory of 3484 1980 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 56 PID 1980 wrote to memory of 3484 1980 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 56 PID 1980 wrote to memory of 3484 1980 JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe 56 PID 5084 wrote to memory of 1000 5084 4fe74739.exe 83 PID 5084 wrote to memory of 1000 5084 4fe74739.exe 83 PID 5084 wrote to memory of 1000 5084 4fe74739.exe 83
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3484
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7b9fcac85230085b3970bc6dd14fffe0.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\4fe74739.exeC:\4fe74739.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5da17e50.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:1000
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD5e351365b4bc9f244b8424288e2cdbcbd
SHA1f2d70670f8d230a59b453ae4cf4738e7675221a2
SHA256d511d476b6777335ed6d1bc3ce7efdf84a91bf04a6514c263c28caec186e09ee
SHA512263f3db3f4d4d7e4d8cfef8663ab9dbebfa3f6606c1eca0fe0fbcaa867e0980617972d1e15c888fd7c849b4d17e457e877991c55ea82c10e8033662e26520864
-
Filesize
4B
MD5d3b07384d113edec49eaa6238ad5ff00
SHA1f1d2d2f924e986ac86fdf7b36c94bcdf32beec15
SHA256b5bb9d8014a0f9b1d61e21e796d78dccdf1352f23cd32812f4850b878ae4944c
SHA5120cf9180a764aba863a67b6d72f0918bc131c6772642cb2dce5a34f0a702f9470ddc2bf125c12198b1995c233c34b4afd346c54a2334c350a948a51b6e8b4e6b6
-
Filesize
129B
MD53a325096a0a5ea1d8d3a3c726d203635
SHA1ce1ad8b2e9da189612baf65731914c2d846ef847
SHA256f7938954be1c786a99ac872be45d1f114718ddfa885ee809b5710b7f215fbf31
SHA512c4b8950884c8729d424eee38e644325523124d84f44d61261067e56395c88fb359821c166cb01d951f1be1aca610fb064ba74e5552626683e1ac1c25493ad4a6