Overview
overview
10Static
static
3d94dd6d211...6N.exe
windows7-x64
10d94dd6d211...6N.exe
windows10-2004-x64
10d94dd6d211...6N.exe
android-9-x86
d94dd6d211...6N.exe
android-10-x64
d94dd6d211...6N.exe
android-11-x64
d94dd6d211...6N.exe
macos-10.15-amd64
d94dd6d211...6N.exe
ubuntu-18.04-amd64
d94dd6d211...6N.exe
debian-9-armhf
d94dd6d211...6N.exe
debian-9-mips
d94dd6d211...6N.exe
debian-9-mipsel
Analysis
-
max time kernel
419s -
max time network
423s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2025, 08:27
Static task
static1
Behavioral task
behavioral1
Sample
d94dd6d211cb4d1256c8aac93812ac54e0447eeae5ffc3400d6e566f703e9bd6N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d94dd6d211cb4d1256c8aac93812ac54e0447eeae5ffc3400d6e566f703e9bd6N.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
d94dd6d211cb4d1256c8aac93812ac54e0447eeae5ffc3400d6e566f703e9bd6N.exe
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral4
Sample
d94dd6d211cb4d1256c8aac93812ac54e0447eeae5ffc3400d6e566f703e9bd6N.exe
Resource
android-x64-20240624-en
Behavioral task
behavioral5
Sample
d94dd6d211cb4d1256c8aac93812ac54e0447eeae5ffc3400d6e566f703e9bd6N.exe
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral6
Sample
d94dd6d211cb4d1256c8aac93812ac54e0447eeae5ffc3400d6e566f703e9bd6N.exe
Resource
macos-20241106-en
Behavioral task
behavioral7
Sample
d94dd6d211cb4d1256c8aac93812ac54e0447eeae5ffc3400d6e566f703e9bd6N.exe
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral8
Sample
d94dd6d211cb4d1256c8aac93812ac54e0447eeae5ffc3400d6e566f703e9bd6N.exe
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral9
Sample
d94dd6d211cb4d1256c8aac93812ac54e0447eeae5ffc3400d6e566f703e9bd6N.exe
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral10
Sample
d94dd6d211cb4d1256c8aac93812ac54e0447eeae5ffc3400d6e566f703e9bd6N.exe
Resource
debian9-mipsel-20240418-en
General
-
Target
d94dd6d211cb4d1256c8aac93812ac54e0447eeae5ffc3400d6e566f703e9bd6N.exe
-
Size
296KB
-
MD5
9dc7cd1629a4b4db9b98a6252169a3f0
-
SHA1
51d93267a098c1b3193082737fa007d3ea068795
-
SHA256
d94dd6d211cb4d1256c8aac93812ac54e0447eeae5ffc3400d6e566f703e9bd6
-
SHA512
5e3b06b6adec0549e5f62678e84ccb9390574b022a671936a6ab51caa5d47e2b8fef97abfc5f806c54092b810e3e19c0549e90ed8e6c15888dd272054762f38f
-
SSDEEP
6144:7MDcW16ZwIJssQ8Uy4UcYZVTc2rPzjJOHAOgxqqDLu23:7MDV1EEd+4UcUVTjPEHRqnu
Malware Config
Extracted
bdaejec
ddos.dnsnb8.net
Signatures
-
Bdaejec family
-
Detects Bdaejec Backdoor. 1 IoCs
Bdaejec is backdoor written in C++.
resource yara_rule behavioral2/memory/2956-47-0x00000000001F0000-0x00000000001F9000-memory.dmp family_bdaejec_backdoor -
resource yara_rule behavioral2/files/0x000a000000023bfc-4.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation OiXu.exe -
Executes dropped EXE 1 IoCs
pid Process 2956 OiXu.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\ktab.exe OiXu.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javaw.exe OiXu.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\AppVDllSurrogate32.exe OiXu.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaws.exe OiXu.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\codecpacks.VP9.exe OiXu.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxSpeechToTextOverlay_1.17.29001.0_x64__8wekyb3d8bbwe\SpeechToTextOverlay64-Retail.exe OiXu.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\klist.exe OiXu.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmic.exe OiXu.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\unpack200.exe OiXu.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOUC.EXE OiXu.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ORGCHART.EXE OiXu.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msotd.exe OiXu.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE OiXu.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\fmui\fmui.exe OiXu.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jabswitch.exe OiXu.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\orbd.exe OiXu.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{86586A1C-7EEC-4BB2-AD86-7C1FB3D0D811}\chrome_installer.exe OiXu.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoev.exe OiXu.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOSREC.EXE OiXu.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOSYNC.EXE OiXu.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\createdump.exe OiXu.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe OiXu.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\tnameserv.exe OiXu.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsgen.exe OiXu.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\EXCEL.EXE OiXu.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32Info.exe OiXu.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javacpl.exe OiXu.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\codecpacks.heif.exe OiXu.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGamingOverlay_2.34.28001.0_x64__8wekyb3d8bbwe\GameBar.exe OiXu.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java-rmi.exe OiXu.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\helper.exe OiXu.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\Cortana.exe OiXu.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeBackgroundHost.exe OiXu.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateComRegisterShell64.exe OiXu.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SkypeSrv\SKYPESERVER.EXE OiXu.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\AppInstallerPythonRedirector.exe OiXu.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_x64__8wekyb3d8bbwe\Microsoft.MicrosoftSolitaireCollection.exe OiXu.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstack.exe OiXu.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\policytool.exe OiXu.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jjs.exe OiXu.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\unpack200.exe OiXu.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\excelcnv.exe OiXu.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.NetFX45.exe OiXu.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe OiXu.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\MixedRealityPortal.Brokered.exe OiXu.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\HxTsr.exe OiXu.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroTextExtractor.exe OiXu.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\64BitMAPIBroker.exe OiXu.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\idlj.exe OiXu.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdeps.exe OiXu.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\pack200.exe OiXu.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ONENOTEM.EXE OiXu.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SDXHelper.exe OiXu.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PerfBoost.exe OiXu.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jarsigner.exe OiXu.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaw.exe OiXu.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdb.exe OiXu.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmiregistry.exe OiXu.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.Loader.exe OiXu.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Common.DBConnection64.exe OiXu.exe File opened for modification C:\Program Files\Microsoft Office 15\ClientX64\OfficeClickToRun.exe OiXu.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\LogTransport2.exe OiXu.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\AppVLP.exe OiXu.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\Addons\OneDriveSetup.exe OiXu.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d94dd6d211cb4d1256c8aac93812ac54e0447eeae5ffc3400d6e566f703e9bd6N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OiXu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2524 wrote to memory of 2956 2524 d94dd6d211cb4d1256c8aac93812ac54e0447eeae5ffc3400d6e566f703e9bd6N.exe 83 PID 2524 wrote to memory of 2956 2524 d94dd6d211cb4d1256c8aac93812ac54e0447eeae5ffc3400d6e566f703e9bd6N.exe 83 PID 2524 wrote to memory of 2956 2524 d94dd6d211cb4d1256c8aac93812ac54e0447eeae5ffc3400d6e566f703e9bd6N.exe 83 PID 2956 wrote to memory of 1144 2956 OiXu.exe 84 PID 2956 wrote to memory of 1144 2956 OiXu.exe 84 PID 2956 wrote to memory of 1144 2956 OiXu.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\d94dd6d211cb4d1256c8aac93812ac54e0447eeae5ffc3400d6e566f703e9bd6N.exeC:\Users\Admin\AppData\Local\Temp\d94dd6d211cb4d1256c8aac93812ac54e0447eeae5ffc3400d6e566f703e9bd6N.exe cmd /c %TERMINATE% "DELETE"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\OiXu.exeC:\Users\Admin\AppData\Local\Temp\OiXu.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\50101317.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:1144
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4B
MD5d3b07384d113edec49eaa6238ad5ff00
SHA1f1d2d2f924e986ac86fdf7b36c94bcdf32beec15
SHA256b5bb9d8014a0f9b1d61e21e796d78dccdf1352f23cd32812f4850b878ae4944c
SHA5120cf9180a764aba863a67b6d72f0918bc131c6772642cb2dce5a34f0a702f9470ddc2bf125c12198b1995c233c34b4afd346c54a2334c350a948a51b6e8b4e6b6
-
Filesize
4B
MD520879c987e2f9a916e578386d499f629
SHA1c7b33ddcc42361fdb847036fc07e880b81935d5d
SHA2569f2981a7cc4d40a2a409dc895de64253acd819d7c0011c8e80b86fe899464e31
SHA512bcdde1625364dd6dd143b45bdcec8d59cf8982aff33790d390b839f3869e0e815684568b14b555a596d616252aeeaa98dac2e6e551c9095ea11a575ff25ff84f
-
Filesize
183B
MD5e5e5072a1f392b050c26269f3ce30643
SHA1f528ab9849f8d550a74a4172d0ea9b9483329399
SHA25676dd378abeebb512e303243aecc339b2780e896e0081e6e1bc3a58f3f435d5f4
SHA512ed4b491c4e0a24ac921b9738283abf6baa8069c92a9327b7f4f4b9660350a8315420c5af382cb4130fa3c3de8853043c35362a00cd6dd9b4420f7185607f1f7d
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e