Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    106s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/01/2025, 02:31 UTC

General

  • Target

    2025-01-07_24b6cb4a4e74e31d75456cc3d43444da_mafia_wapomi.exe

  • Size

    1.6MB

  • MD5

    24b6cb4a4e74e31d75456cc3d43444da

  • SHA1

    682f244e75e459b5a483157b43138cb5b0379c33

  • SHA256

    eb15944ffc429eedfedaae8f6bf4f72ad0a77756ee45cd3e29d1e300d9b5a47e

  • SHA512

    b21d78466f2967c8f0a37b32173b8ab1c57d142d4e0d2a38073c749633dfdc99469a6263eccc4d08a70c9ed3180e9eb953479acf9ab0353565c38d0237226d28

  • SSDEEP

    49152:XE4XbjEKOh3SbiwJjn7gu5LUvdW9apuLvht/cionurM0EIMa1:Xrj834iwJjn7gu5LmMapuNiiMurM0

Malware Config

Extracted

Family

bdaejec

C2

ddos.dnsnb8.net

Signatures

  • Bdaejec

    Bdaejec is a backdoor written in C++.

  • Bdaejec family
  • Detects Bdaejec Backdoor. 1 IoCs

    Bdaejec is backdoor written in C++.

  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 12 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-01-07_24b6cb4a4e74e31d75456cc3d43444da_mafia_wapomi.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-01-07_24b6cb4a4e74e31d75456cc3d43444da_mafia_wapomi.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Checks SCSI registry key(s)
    • Suspicious use of WriteProcessMemory
    PID:2432
    • C:\Users\Admin\AppData\Local\Temp\LaPUbseA.exe
      C:\Users\Admin\AppData\Local\Temp\LaPUbseA.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1600
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1f9b510f.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1712

Network

  • flag-us
    DNS
    ddos.dnsnb8.net
    LaPUbseA.exe
    Remote address:
    8.8.8.8:53
    Request
    ddos.dnsnb8.net
    IN A
    Response
    ddos.dnsnb8.net
    IN A
    44.221.84.105
  • flag-us
    DNS
    172.214.232.199.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    172.214.232.199.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    217.106.137.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    217.106.137.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    134.32.126.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    134.32.126.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    95.221.229.192.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    95.221.229.192.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    197.87.175.4.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    197.87.175.4.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    18.31.95.13.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    18.31.95.13.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    9.66.18.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    9.66.18.2.in-addr.arpa
    IN PTR
    Response
    9.66.18.2.in-addr.arpa
    IN PTR
    a2-18-66-9deploystaticakamaitechnologiescom
  • flag-us
    DNS
    8.153.16.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    8.153.16.2.in-addr.arpa
    IN PTR
    Response
    8.153.16.2.in-addr.arpa
    IN PTR
    a2-16-153-8deploystaticakamaitechnologiescom
  • flag-us
    DNS
    86.49.80.91.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    86.49.80.91.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    43.229.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    43.229.111.52.in-addr.arpa
    IN PTR
    Response
  • 44.221.84.105:799
    ddos.dnsnb8.net
    LaPUbseA.exe
    260 B
    5
  • 44.221.84.105:799
    ddos.dnsnb8.net
    LaPUbseA.exe
    260 B
    5
  • 44.221.84.105:799
    ddos.dnsnb8.net
    LaPUbseA.exe
    260 B
    5
  • 44.221.84.105:799
    ddos.dnsnb8.net
    LaPUbseA.exe
    260 B
    5
  • 44.221.84.105:799
    ddos.dnsnb8.net
    LaPUbseA.exe
    260 B
    5
  • 8.8.8.8:53
    ddos.dnsnb8.net
    dns
    LaPUbseA.exe
    61 B
    77 B
    1
    1

    DNS Request

    ddos.dnsnb8.net

    DNS Response

    44.221.84.105

  • 8.8.8.8:53
    172.214.232.199.in-addr.arpa
    dns
    74 B
    128 B
    1
    1

    DNS Request

    172.214.232.199.in-addr.arpa

  • 8.8.8.8:53
    217.106.137.52.in-addr.arpa
    dns
    73 B
    147 B
    1
    1

    DNS Request

    217.106.137.52.in-addr.arpa

  • 8.8.8.8:53
    134.32.126.40.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    134.32.126.40.in-addr.arpa

  • 8.8.8.8:53
    95.221.229.192.in-addr.arpa
    dns
    73 B
    144 B
    1
    1

    DNS Request

    95.221.229.192.in-addr.arpa

  • 8.8.8.8:53
    197.87.175.4.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    197.87.175.4.in-addr.arpa

  • 8.8.8.8:53
    18.31.95.13.in-addr.arpa
    dns
    70 B
    144 B
    1
    1

    DNS Request

    18.31.95.13.in-addr.arpa

  • 8.8.8.8:53
    9.66.18.2.in-addr.arpa
    dns
    68 B
    129 B
    1
    1

    DNS Request

    9.66.18.2.in-addr.arpa

  • 8.8.8.8:53
    8.153.16.2.in-addr.arpa
    dns
    69 B
    131 B
    1
    1

    DNS Request

    8.153.16.2.in-addr.arpa

  • 8.8.8.8:53
    86.49.80.91.in-addr.arpa
    dns
    70 B
    145 B
    1
    1

    DNS Request

    86.49.80.91.in-addr.arpa

  • 8.8.8.8:53
    43.229.111.52.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    43.229.111.52.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\1f9b510f.bat

    Filesize

    191B

    MD5

    8cd209922c6850357bc1ebacc8b26feb

    SHA1

    491ce49dd61ad891ed6d18f9a1a940ac6759bc71

    SHA256

    f496c38855c3cc58e062447938abb4965028ff6387e6a1af10cd4a04e591dc02

    SHA512

    974203f07cfc8218dd57baecb3ccb43862df315007d2e9ece078e19bd8bf54174cbc9178309c2504bf0e9b23361ceffe7d91170ae5ce86a6fb4a745c51ccfdce

  • C:\Users\Admin\AppData\Local\Temp\LaPUbseA.exe

    Filesize

    15KB

    MD5

    56b2c3810dba2e939a8bb9fa36d3cf96

    SHA1

    99ee31cd4b0d6a4b62779da36e0eeecdd80589fc

    SHA256

    4354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07

    SHA512

    27812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e

  • memory/1600-4-0x0000000000BF0000-0x0000000000BF9000-memory.dmp

    Filesize

    36KB

  • memory/1600-11-0x0000000000BF0000-0x0000000000BF9000-memory.dmp

    Filesize

    36KB

  • memory/2432-0-0x0000000000390000-0x000000000053B000-memory.dmp

    Filesize

    1.7MB

  • memory/2432-10-0x0000000000390000-0x000000000053B000-memory.dmp

    Filesize

    1.7MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.