Analysis
-
max time kernel
106s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-01-2025 01:25
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-15_0d45b4c94335fe84f2d462d254b2bddf_smoke-loader_wapomi.exe
Resource
win7-20240903-en
General
-
Target
2025-01-15_0d45b4c94335fe84f2d462d254b2bddf_smoke-loader_wapomi.exe
-
Size
80KB
-
MD5
0d45b4c94335fe84f2d462d254b2bddf
-
SHA1
905fd0d56df6fa5a7e1606afc623d06b07e1adef
-
SHA256
4dfab1dfa9757ce70d49f19ca60726530f11a35627cd61006ab63c6141f559c2
-
SHA512
e1b545567e127ed1df1d817d70031bde20b57c83b1834cfff541dab88b8c44d7d4c1fafff71f70b8cb740f8e8443b54fec81223108606305430f9e564228cf8f
-
SSDEEP
1536:NHB0UxMkzOt7HcvJGt5AdHIOWnToIf12Z13GCq2iW7z:NhAWJGSCTBf12ZhGCH
Malware Config
Extracted
bdaejec
ddos.dnsnb8.net
Signatures
-
Bdaejec family
-
Detects Bdaejec Backdoor. 1 IoCs
Bdaejec is backdoor written in C++.
resource yara_rule behavioral2/memory/4124-8-0x00000000002E0000-0x00000000002E9000-memory.dmp family_bdaejec_backdoor -
resource yara_rule behavioral2/files/0x000a000000023bde-3.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation lcSwJl.exe -
Executes dropped EXE 1 IoCs
pid Process 4124 lcSwJl.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Office16\WORDICON.EXE lcSwJl.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\MSOHTMED.EXE lcSwJl.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxIdentityProvider_12.50.6001.0_x64__8wekyb3d8bbwe\XboxIdp.exe lcSwJl.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\unpack200.exe lcSwJl.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\java-rmi.exe lcSwJl.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\native2ascii.exe lcSwJl.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\ktab.exe lcSwJl.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\tnameserv.exe lcSwJl.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeBridge\SkypeBridge.exe lcSwJl.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_x64__8wekyb3d8bbwe\Microsoft.WebMediaExtensions.exe lcSwJl.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jinfo.exe lcSwJl.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jsadebugd.exe lcSwJl.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Music.UI.exe lcSwJl.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\unpack200.exe lcSwJl.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Common.ShowHelp.exe lcSwJl.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\codecpacks.heif.exe lcSwJl.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\rmiregistry.exe lcSwJl.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\EQUATION\eqnedt32.exe lcSwJl.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jjs.exe lcSwJl.exe File opened for modification C:\Program Files\Windows Photo Viewer\ImagingDevices.exe lcSwJl.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\Cortana.exe lcSwJl.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\HxTsr.exe lcSwJl.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateOnDemand.exe lcSwJl.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmiregistry.exe lcSwJl.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsimport.exe lcSwJl.exe File opened for modification C:\Program Files (x86)\Google\Update\DisabledGoogleUpdate.exe lcSwJl.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\HxOutlook.exe lcSwJl.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\LogTransport2.exe lcSwJl.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Wallet_2.4.18324.0_x64__8wekyb3d8bbwe\Microsoft.Wallet.exe lcSwJl.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\YourPhone.exe lcSwJl.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Common.DBConnection64.exe lcSwJl.exe File opened for modification C:\Program Files\Windows Mail\wabmig.exe lcSwJl.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxSpeechToTextOverlay_1.17.29001.0_x64__8wekyb3d8bbwe\SpeechToTextOverlay64-Retail.exe lcSwJl.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\arh.exe lcSwJl.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\orbd.exe lcSwJl.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGamingOverlay_2.34.28001.0_x64__8wekyb3d8bbwe\GameBar.exe lcSwJl.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\tnameserv.exe lcSwJl.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msotd.exe lcSwJl.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\helper.exe lcSwJl.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\XboxApp.exe lcSwJl.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jarsigner.exe lcSwJl.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaws.exe lcSwJl.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javaws.exe lcSwJl.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jp2launcher.exe lcSwJl.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\pack200.exe lcSwJl.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\policytool.exe lcSwJl.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe lcSwJl.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AdobeCollabSync.exe lcSwJl.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javah.exe lcSwJl.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdb.exe lcSwJl.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{1E8F5DDF-3FB3-4332-A4CC-B46FF6E6899A}\chrome_installer.exe lcSwJl.exe File opened for modification C:\Program Files\Mozilla Firefox\private_browsing.exe lcSwJl.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\reader_sl.exe lcSwJl.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\kinit.exe lcSwJl.exe File opened for modification C:\Program Files\Windows Security\BrowserCore\BrowserCore.exe lcSwJl.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\codecpacks.webp.exe lcSwJl.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe lcSwJl.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jps.exe lcSwJl.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\POWERPNT.EXE lcSwJl.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoadfsb.exe lcSwJl.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSQRY32.EXE lcSwJl.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\codecpacks.VP9.exe lcSwJl.exe File opened for modification C:\Program Files (x86)\Windows Mail\wabmig.exe lcSwJl.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\officeappguardwin32.exe lcSwJl.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-01-15_0d45b4c94335fe84f2d462d254b2bddf_smoke-loader_wapomi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lcSwJl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3180 wrote to memory of 4124 3180 2025-01-15_0d45b4c94335fe84f2d462d254b2bddf_smoke-loader_wapomi.exe 82 PID 3180 wrote to memory of 4124 3180 2025-01-15_0d45b4c94335fe84f2d462d254b2bddf_smoke-loader_wapomi.exe 82 PID 3180 wrote to memory of 4124 3180 2025-01-15_0d45b4c94335fe84f2d462d254b2bddf_smoke-loader_wapomi.exe 82 PID 4124 wrote to memory of 3396 4124 lcSwJl.exe 92 PID 4124 wrote to memory of 3396 4124 lcSwJl.exe 92 PID 4124 wrote to memory of 3396 4124 lcSwJl.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-01-15_0d45b4c94335fe84f2d462d254b2bddf_smoke-loader_wapomi.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-15_0d45b4c94335fe84f2d462d254b2bddf_smoke-loader_wapomi.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Users\Admin\AppData\Local\Temp\lcSwJl.exeC:\Users\Admin\AppData\Local\Temp\lcSwJl.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\6f073c97.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:3396
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
187B
MD5d9df5243622c76b980e0618b8147f174
SHA145cfccc393275290c7895939eadc39f35ab6614e
SHA2562326f321ee6815263c2239722d4c7bd89d10c541a25eff42f086cf1e1c6916a7
SHA5126775762e8b8ba0844adbe23482531da35b48a7d65c02c1698b9f0d6645c9af3426065f0517ca26ffd832836c7de04663eeb3de859c3d236368a48cbd4bf96534
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e