Analysis
-
max time kernel
7s -
max time network
8s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-01-2025 02:44
Behavioral task
behavioral1
Sample
2025-01-21_1f4ef1f21b247dd569840d77cd1ea29d_smoke-loader_wapomi.exe
Resource
win7-20240903-en
Errors
General
-
Target
2025-01-21_1f4ef1f21b247dd569840d77cd1ea29d_smoke-loader_wapomi.exe
-
Size
64KB
-
MD5
1f4ef1f21b247dd569840d77cd1ea29d
-
SHA1
941b9f2952392ec32c836885685cad234b23bc58
-
SHA256
554a09b7c092447a32dbb65ad47b8ff62394933412b35babf6352cfd917cc6d8
-
SHA512
087389a8e87f5fffcc9e69618a0543b1c7cc18d7152304cab01db4ac612bad6f1d1223ab8c6dfe46f7804e614842d1706a66b59bc338f52be308eab5fb339731
-
SSDEEP
768:7E09MOEzWGoOIx2qCZVZmj+Wg5VK2LDakrDZ5yS/wwHA49kszNAY1XKoJc4P1c2m:/7w73bUNMMkrDry+6UtctGCq2iW7z
Malware Config
Extracted
bdaejec
ddos.dnsnb8.net
Signatures
-
Bdaejec family
-
Detects Bdaejec Backdoor. 1 IoCs
Bdaejec is backdoor written in C++.
resource yara_rule behavioral1/memory/2696-22-0x0000000000E80000-0x0000000000E89000-memory.dmp family_bdaejec_backdoor -
resource yara_rule behavioral1/files/0x0007000000012116-4.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 2696 wxA.exe -
Loads dropped DLL 2 IoCs
pid Process 2660 2025-01-21_1f4ef1f21b247dd569840d77cd1ea29d_smoke-loader_wapomi.exe 2660 2025-01-21_1f4ef1f21b247dd569840d77cd1ea29d_smoke-loader_wapomi.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\2503326475_del = "cmd /c del \"C:\\Users\\Admin\\AppData\\Local\\Temp\\2025-01-21_1f4ef1f21b247dd569840d77cd1ea29d_smoke-loader_wapomi.exe\"" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\2503326475 = "C:\\Users\\Admin\\2503326475\\2503326475.exe" reg.exe -
resource yara_rule behavioral1/memory/2660-1-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral1/memory/2660-20-0x0000000000400000-0x0000000000425000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\servertool.exe wxA.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\rmid.exe wxA.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ssvagent.exe wxA.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe wxA.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe wxA.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe wxA.exe File opened for modification C:\Program Files\Windows Journal\PDIALOG.exe wxA.exe File opened for modification C:\Program Files\Windows Sidebar\sidebar.exe wxA.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{26793F86-7A02-4BBD-B5DA-4AA3D83AA174}\chrome_installer.exe wxA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOHTMED.EXE wxA.exe File opened for modification C:\Program Files (x86)\Windows Mail\wabmig.exe wxA.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\rmiregistry.exe wxA.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\orbd.exe wxA.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\launcher.exe wxA.exe File opened for modification C:\Program Files\Java\jre7\bin\javacpl.exe wxA.exe File opened for modification C:\Program Files\Java\jre7\bin\rmid.exe wxA.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmic.exe wxA.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java.exe wxA.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jps.exe wxA.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\pack200.exe wxA.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\schemagen.exe wxA.exe File opened for modification C:\Program Files\Java\jre7\bin\javaw.exe wxA.exe File opened for modification C:\Program Files\Java\jre7\bin\rmiregistry.exe wxA.exe File opened for modification C:\Program Files\Mozilla Firefox\private_browsing.exe wxA.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.exe wxA.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroTextExtractor.exe wxA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OIS.EXE wxA.exe File opened for modification C:\Program Files\Windows Photo Viewer\ImagingDevices.exe wxA.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe wxA.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmc.exe wxA.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\wsimport.exe wxA.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec64.exe wxA.exe File opened for modification C:\Program Files\Java\jre7\bin\ssvagent.exe wxA.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\shvlzm.exe wxA.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\PurblePlace.exe wxA.exe File opened for modification C:\Program Files\7-Zip\7zG.exe wxA.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateSetup.exe wxA.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\106.0.5249.119\chrome_installer.exe wxA.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\Setup.exe wxA.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe wxA.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\extcheck.exe wxA.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\orbd.exe wxA.exe File opened for modification C:\Program Files\Java\jre7\bin\pack200.exe wxA.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32Info.exe wxA.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe wxA.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\wsgen.exe wxA.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\pack200.exe wxA.exe File opened for modification C:\Program Files\Java\jre7\bin\policytool.exe wxA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe wxA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSTORE.EXE wxA.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jhat.exe wxA.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe wxA.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe wxA.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AdobeCollabSync.exe wxA.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\SC_Reader.exe wxA.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaw.exe wxA.exe File opened for modification C:\Program Files\Java\jre7\bin\tnameserv.exe wxA.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler64.exe wxA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\misc.exe wxA.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java-rmi.exe wxA.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jarsigner.exe wxA.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\MineSweeper.exe wxA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\excelcnv.exe wxA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE wxA.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2584 2660 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-01-21_1f4ef1f21b247dd569840d77cd1ea29d_smoke-loader_wapomi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shutdown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 1968 shutdown.exe Token: SeRemoteShutdownPrivilege 1968 shutdown.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2660 wrote to memory of 2696 2660 2025-01-21_1f4ef1f21b247dd569840d77cd1ea29d_smoke-loader_wapomi.exe 30 PID 2660 wrote to memory of 2696 2660 2025-01-21_1f4ef1f21b247dd569840d77cd1ea29d_smoke-loader_wapomi.exe 30 PID 2660 wrote to memory of 2696 2660 2025-01-21_1f4ef1f21b247dd569840d77cd1ea29d_smoke-loader_wapomi.exe 30 PID 2660 wrote to memory of 2696 2660 2025-01-21_1f4ef1f21b247dd569840d77cd1ea29d_smoke-loader_wapomi.exe 30 PID 2660 wrote to memory of 1968 2660 2025-01-21_1f4ef1f21b247dd569840d77cd1ea29d_smoke-loader_wapomi.exe 31 PID 2660 wrote to memory of 1968 2660 2025-01-21_1f4ef1f21b247dd569840d77cd1ea29d_smoke-loader_wapomi.exe 31 PID 2660 wrote to memory of 1968 2660 2025-01-21_1f4ef1f21b247dd569840d77cd1ea29d_smoke-loader_wapomi.exe 31 PID 2660 wrote to memory of 1968 2660 2025-01-21_1f4ef1f21b247dd569840d77cd1ea29d_smoke-loader_wapomi.exe 31 PID 2660 wrote to memory of 2664 2660 2025-01-21_1f4ef1f21b247dd569840d77cd1ea29d_smoke-loader_wapomi.exe 33 PID 2660 wrote to memory of 2664 2660 2025-01-21_1f4ef1f21b247dd569840d77cd1ea29d_smoke-loader_wapomi.exe 33 PID 2660 wrote to memory of 2664 2660 2025-01-21_1f4ef1f21b247dd569840d77cd1ea29d_smoke-loader_wapomi.exe 33 PID 2660 wrote to memory of 2664 2660 2025-01-21_1f4ef1f21b247dd569840d77cd1ea29d_smoke-loader_wapomi.exe 33 PID 2660 wrote to memory of 2548 2660 2025-01-21_1f4ef1f21b247dd569840d77cd1ea29d_smoke-loader_wapomi.exe 35 PID 2660 wrote to memory of 2548 2660 2025-01-21_1f4ef1f21b247dd569840d77cd1ea29d_smoke-loader_wapomi.exe 35 PID 2660 wrote to memory of 2548 2660 2025-01-21_1f4ef1f21b247dd569840d77cd1ea29d_smoke-loader_wapomi.exe 35 PID 2660 wrote to memory of 2548 2660 2025-01-21_1f4ef1f21b247dd569840d77cd1ea29d_smoke-loader_wapomi.exe 35 PID 2660 wrote to memory of 2584 2660 2025-01-21_1f4ef1f21b247dd569840d77cd1ea29d_smoke-loader_wapomi.exe 36 PID 2660 wrote to memory of 2584 2660 2025-01-21_1f4ef1f21b247dd569840d77cd1ea29d_smoke-loader_wapomi.exe 36 PID 2660 wrote to memory of 2584 2660 2025-01-21_1f4ef1f21b247dd569840d77cd1ea29d_smoke-loader_wapomi.exe 36 PID 2660 wrote to memory of 2584 2660 2025-01-21_1f4ef1f21b247dd569840d77cd1ea29d_smoke-loader_wapomi.exe 36 PID 2548 wrote to memory of 3064 2548 cmd.exe 39 PID 2548 wrote to memory of 3064 2548 cmd.exe 39 PID 2548 wrote to memory of 3064 2548 cmd.exe 39 PID 2548 wrote to memory of 3064 2548 cmd.exe 39 PID 2664 wrote to memory of 2596 2664 cmd.exe 40 PID 2664 wrote to memory of 2596 2664 cmd.exe 40 PID 2664 wrote to memory of 2596 2664 cmd.exe 40 PID 2664 wrote to memory of 2596 2664 cmd.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-01-21_1f4ef1f21b247dd569840d77cd1ea29d_smoke-loader_wapomi.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-21_1f4ef1f21b247dd569840d77cd1ea29d_smoke-loader_wapomi.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\wxA.exeC:\Users\Admin\AppData\Local\Temp\wxA.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2696
-
-
C:\Windows\SysWOW64\shutdown.exe"C:\Windows\System32\shutdown.exe" /r /t 6 /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1968
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v 2503326475 /t REG_SZ /d "C:\Users\Admin\2503326475\2503326475.exe" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v 2503326475 /t REG_SZ /d "C:\Users\Admin\2503326475\2503326475.exe" /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2596
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce /v 2503326475_del /t REG_SZ /d "cmd /c del \"C:\Users\Admin\AppData\Local\Temp\2025-01-21_1f4ef1f21b247dd569840d77cd1ea29d_smoke-loader_wapomi.exe\"" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce /v 2503326475_del /t REG_SZ /d "cmd /c del \"C:\Users\Admin\AppData\Local\Temp\2025-01-21_1f4ef1f21b247dd569840d77cd1ea29d_smoke-loader_wapomi.exe\"" /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3064
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2660 -s 4202⤵
- Program crash
PID:2584
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:2592
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:2864
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
55KB
MD5043ede36f50bf967680bf7a755e1d696
SHA1ce58e54bd47400f7662a73eed234914f5fa8f6e7
SHA2561af8880c5a18d45662f454b20752f0ff49a5da225899be884bf9e269f95fa415
SHA512586bb68e498d00a90cc0971266184fd30277587609355f0246ad49fde7e996c5e0d410f8e89d19880deefc9b0447e6e10fd94a8a79e1cfed6f9b5af738c374ba
-
Filesize
15KB
MD5f7d21de5c4e81341eccd280c11ddcc9a
SHA1d4e9ef10d7685d491583c6fa93ae5d9105d815bd
SHA2564485df22c627fa0bb899d79aa6ff29bc5be1dbc3caa2b7a490809338d54b7794
SHA512e4553b86b083996038bacfb979ad0b86f578f95185d8efac34a77f6cc73e491d4f70e1449bbc9eb1d62f430800c1574101b270e1cb0eeed43a83049a79b636a3