Analysis
-
max time kernel
94s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
17-01-2025 04:43
Static task
static1
Behavioral task
behavioral1
Sample
8ffba760a94a7f13bd1031a83bbfaeef7852788ebc576195254faeb0b66c5dd2N.exe
Resource
win7-20240729-en
General
-
Target
8ffba760a94a7f13bd1031a83bbfaeef7852788ebc576195254faeb0b66c5dd2N.exe
-
Size
432KB
-
MD5
dcfdf94848398f49193b6821bd540b60
-
SHA1
aa841c7ec02fdb8b47871f6abcc57735a12f7a73
-
SHA256
8ffba760a94a7f13bd1031a83bbfaeef7852788ebc576195254faeb0b66c5dd2
-
SHA512
fbd1f3a23da6026f0455bc09c00c5ee1827d37d43376d0980bc35f7d6c080b0cd2671432a4a32e9132f66fbe5bc661235cfb48e102743db44c296a519052ebcd
-
SSDEEP
6144:vvYjUy/29kMLQHxI5STKSiJvzAdBfpjG+CePQNPVvsHN8XS6U9JqK:vvYjK9OTKsBfpjGpPNPMisG
Malware Config
Extracted
bdaejec
ddos.dnsnb8.net
Signatures
-
Bdaejec family
-
Detects Bdaejec Backdoor. 1 IoCs
Bdaejec is backdoor written in C++.
resource yara_rule behavioral1/memory/3000-29-0x0000000000AB0000-0x0000000000AB9000-memory.dmp family_bdaejec_backdoor -
resource yara_rule behavioral1/files/0x000b00000001225e-2.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 3000 GxodRA.exe -
Loads dropped DLL 2 IoCs
pid Process 1940 8ffba760a94a7f13bd1031a83bbfaeef7852788ebc576195254faeb0b66c5dd2N.exe 1940 8ffba760a94a7f13bd1031a83bbfaeef7852788ebc576195254faeb0b66c5dd2N.exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: 8ffba760a94a7f13bd1031a83bbfaeef7852788ebc576195254faeb0b66c5dd2N.exe File opened (read-only) \??\F: 8ffba760a94a7f13bd1031a83bbfaeef7852788ebc576195254faeb0b66c5dd2N.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\keytool.exe GxodRA.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmid.exe GxodRA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE GxodRA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE GxodRA.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jcmd.exe GxodRA.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jdb.exe GxodRA.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstat.exe GxodRA.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\keytool.exe GxodRA.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\Setup.exe GxodRA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOUC.EXE GxodRA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSQRY32.EXE GxodRA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSTORDB.EXE GxodRA.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jabswitch.exe GxodRA.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\xjc.exe GxodRA.exe File opened for modification C:\Program Files\Java\jre7\bin\kinit.exe GxodRA.exe File opened for modification C:\Program Files\Java\jre7\bin\policytool.exe GxodRA.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\SpiderSolitaire.exe GxodRA.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\reader_sl.exe GxodRA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CLVIEW.EXE GxodRA.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\native2ascii.exe GxodRA.exe File opened for modification C:\Program Files\Java\jre7\bin\pack200.exe GxodRA.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\MineSweeper.exe GxodRA.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe GxodRA.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Eula.exe GxodRA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ACCICONS.EXE GxodRA.exe File opened for modification C:\Program Files\Java\jre7\bin\ktab.exe GxodRA.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ktab.exe GxodRA.exe File opened for modification C:\Program Files\Java\jre7\bin\orbd.exe GxodRA.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler.exe GxodRA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CNFNOT32.EXE GxodRA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONENOTE.EXE GxodRA.exe File opened for modification C:\Program Files (x86)\Windows Mail\wab.exe GxodRA.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\policytool.exe GxodRA.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\schemagen.exe GxodRA.exe File opened for modification C:\Program Files\Mozilla Firefox\private_browsing.exe GxodRA.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\kinit.exe GxodRA.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\orbd.exe GxodRA.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\pack200.exe GxodRA.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javadoc.exe GxodRA.exe File opened for modification C:\Program Files\Microsoft Games\Chess\Chess.exe GxodRA.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\chkrzm.exe GxodRA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OIS.EXE GxodRA.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jarsigner.exe GxodRA.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe GxodRA.exe File opened for modification C:\Program Files\Java\jre7\bin\java-rmi.exe GxodRA.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\wsgen.exe GxodRA.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\PurblePlace.exe GxodRA.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe GxodRA.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe GxodRA.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\106.0.5249.119\chrome_installer.exe GxodRA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SETLANG.EXE GxodRA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Wordconv.exe GxodRA.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe GxodRA.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaws.exe GxodRA.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\rmid.exe GxodRA.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ssvagent.exe GxodRA.exe File opened for modification C:\Program Files\Java\jre7\bin\servertool.exe GxodRA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOSYNC.EXE GxodRA.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jps.exe GxodRA.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe GxodRA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE GxodRA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GRAPH.EXE GxodRA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSPUB.EXE GxodRA.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\unpack200.exe GxodRA.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8ffba760a94a7f13bd1031a83bbfaeef7852788ebc576195254faeb0b66c5dd2N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GxodRA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1940 8ffba760a94a7f13bd1031a83bbfaeef7852788ebc576195254faeb0b66c5dd2N.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1940 8ffba760a94a7f13bd1031a83bbfaeef7852788ebc576195254faeb0b66c5dd2N.exe 1940 8ffba760a94a7f13bd1031a83bbfaeef7852788ebc576195254faeb0b66c5dd2N.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1940 wrote to memory of 3000 1940 8ffba760a94a7f13bd1031a83bbfaeef7852788ebc576195254faeb0b66c5dd2N.exe 30 PID 1940 wrote to memory of 3000 1940 8ffba760a94a7f13bd1031a83bbfaeef7852788ebc576195254faeb0b66c5dd2N.exe 30 PID 1940 wrote to memory of 3000 1940 8ffba760a94a7f13bd1031a83bbfaeef7852788ebc576195254faeb0b66c5dd2N.exe 30 PID 1940 wrote to memory of 3000 1940 8ffba760a94a7f13bd1031a83bbfaeef7852788ebc576195254faeb0b66c5dd2N.exe 30 PID 3000 wrote to memory of 2264 3000 GxodRA.exe 31 PID 3000 wrote to memory of 2264 3000 GxodRA.exe 31 PID 3000 wrote to memory of 2264 3000 GxodRA.exe 31 PID 3000 wrote to memory of 2264 3000 GxodRA.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ffba760a94a7f13bd1031a83bbfaeef7852788ebc576195254faeb0b66c5dd2N.exe"C:\Users\Admin\AppData\Local\Temp\8ffba760a94a7f13bd1031a83bbfaeef7852788ebc576195254faeb0b66c5dd2N.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\GxodRA.exeC:\Users\Admin\AppData\Local\Temp\GxodRA.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\198a0e34.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:2264
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
187B
MD50a194d8c4fd2528dc743bccb61669ef8
SHA10e2936a46082ee51c24c19c2e85176d6ac36d7da
SHA256db135d4ec6e7f0c75a8a757059f7817100e425995edc68e81cc8e040d8009ded
SHA512b371f5dec398345c5cab00e8f052bcfc8f8f73dba4b0a2814a887593fb97a02e8415b0747c046bfc1eff8b093ba8c5a227f771edf9ea572ee9a8467f2b236b52
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e